Sciweavers

8381 search results - page 150 / 1677
» The security of machine learning
Sort
View
151
Voted
ICCS
2001
Springer
15 years 9 months ago
The Policy Machine for Security Policy Management
Abstract. Many different access control policies and models have been developed to suit a variety of goals; these include Role-Based Access Control, One-directional Information Flo...
Vincent C. Hu, Deborah A. Frincke, David F. Ferrai...
ESORICS
2005
Springer
15 years 10 months ago
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Abstract. Formal methods have been extensively applied to the certification of cryptographic protocols. However, most of these works make the perfect cryptography assumption, i.e....
Sabrina Tarento
ACSAC
2010
IEEE
15 years 2 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
ECAI
2006
Springer
15 years 8 months ago
Efficient Knowledge Acquisition for Extracting Temporal Relations
Abstract. Machine learning approaches in natural language processing often require a large annotated corpus. We present a complementary approach that utilizes expert knowledge to o...
Son Bao Pham, Achim G. Hoffmann
134
Voted
ACL2
2006
ACM
15 years 11 months ago
A robust machine code proof framework for highly secure applications
David S. Hardin, Eric W. Smith, William D. Young