Sciweavers

619 search results - page 11 / 124
» Learning with Security
Sort
View
IFIP
2007
Springer
14 years 1 months ago
Lessons Learned from the Maroochy Water Breach
Supervisory control and data acquisition (SCADA) systems are widely used to monitor and control operations in electrical power distribution facilities, oil and gas pipelines, water...
Jill Slay, Michael Miller
CIKM
2005
Springer
14 years 1 months ago
Privacy leakage in multi-relational databases via pattern based semi-supervised learning
In multi-relational databases, a view, which is a context- and content-dependent subset of one or more tables (or other views), is often used to preserve privacy by hiding sensiti...
Hui Xiong, Michael Steinbach, Vipin Kumar
IADIS
2004
13 years 9 months ago
Hacker Activity on the Irish Honeynet
The Irish HoneyNet Project is an all volunteer, non-profit organisation committed to sharing and learning the motives, tools, and tactics of the blackhat community comprised of a ...
Kevin Curran, Colman Morrissey, Colm Fagan, Colm M...
ICANN
2010
Springer
13 years 8 months ago
Policy Gradients for Cryptanalysis
So-called Physical Unclonable Functions are an emerging, new cryptographic and security primitive. They can potentially replace secret binary keys in vulnerable hardware systems an...
Frank Sehnke, Christian Osendorfer, Jan Sölte...
AGENTS
2001
Springer
14 years 4 days ago
Using background knowledge to speed reinforcement learning in physical agents
This paper describes Icarus, an agent architecture that embeds a hierarchical reinforcement learning algorithm within a language for specifying agent behavior. An Icarus program e...
Daniel G. Shapiro, Pat Langley, Ross D. Shachter