Sciweavers

8381 search results - page 132 / 1677
» The security of machine learning
Sort
View
DSRT
2008
IEEE
15 years 11 months ago
Modeling System Security Rules with Time Constraints Using Timed Extended Finite State Machines
Security and reliability are of paramount importance in designing and building real-time systems because any security failure can put the public and the environment at risk. In th...
Wissam Mallouli, Amel Mammar, Ana R. Cavalli
120
Voted
INFOCOM
2012
IEEE
13 years 7 months ago
Firewall fingerprinting
—Firewalls are critical security devices handling all traffic in and out of a network. Firewalls, like other software and hardware network devices, have vulnerabilities, which c...
Amir R. Khakpour, Joshua W. Hulst, Zihui Ge, Alex ...
141
Voted
IADIS
2008
15 years 6 months ago
Modelling Collaborative Competence Level Using Machine Learning Techniques
Using open e-learning platforms as a tool to support the learning process has become an international tendency. Specially, in order to motivate the achievement of desired competen...
Laura Mancera Valetts, Silvia Baldiris Navarro, Ra...
138
Voted
CCS
2008
ACM
15 years 6 months ago
CMV: automatic verification of complete mediation for java virtual machines
Runtime monitoring systems play an important role in system security, and verification efforts that ensure that these systems satisfy certain desirable security properties are gro...
A. Prasad Sistla, V. N. Venkatakrishnan, Michelle ...
153
Voted
AAAI
2011
14 years 4 months ago
Effective End-User Interaction with Machine Learning
End-user interactive machine learning is a promising tool for enhancing human productivity and capabilities with large unstructured data sets. Recent work has shown that we can cr...
Saleema Amershi, James Fogarty, Ashish Kapoor, Des...