Sciweavers

3556 search results - page 619 / 712
» Can machine learning be secure
Sort
View
JSAC
2010
188views more  JSAC 2010»
13 years 5 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...
WPES
2003
ACM
14 years 3 months ago
Reusable anonymous return channels
Mix networks are used to deliver messages anonymously to recipients, but do not straightforwardly allow the recipient of an anonymous message to reply to its sender. Yet the abili...
Philippe Golle, Markus Jakobsson
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 8 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayā...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 3 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-ļ¬‚y by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
SAFECOMP
2004
Springer
14 years 3 months ago
Using Fuzzy Self-Organising Maps for Safety Critical Systems
This paper deļ¬nes a type of constrained artiļ¬cial neural network (ANN) that enables analytical certiļ¬cation arguments whilst retaining valuable performance characteristics. ...
Zeshan Kurd, Tim Kelly