Sciweavers

658 search results - page 75 / 132
» Open problems in the security of learning
Sort
View
ML
2010
ACM
155views Machine Learning» more  ML 2010»
13 years 7 months ago
On the infeasibility of modeling polymorphic shellcode - Re-thinking the role of learning in intrusion detection systems
Current trends demonstrate an increasing use of polymorphism by attackers to disguise their exploits. The ability for malicious code to be easily, and automatically, transformed in...
Yingbo Song, Michael E. Locasto, Angelos Stavrou, ...
AAMAS
2007
Springer
13 years 9 months ago
A framework for meta-level control in multi-agent systems
Sophisticated agents operating in open environments must make decisions that efficiently trade off the use of their limited resources between dynamic deliberative actions and dom...
Anita Raja, Victor R. Lesser
AAAI
2012
11 years 11 months ago
Far Out: Predicting Long-Term Human Mobility
Much work has been done on predicting where is one going to be in the immediate future, typically within the next hour. By contrast, we address the open problem of predicting huma...
Adam Sadilek, John Krumm
CDVE
2004
Springer
113views Visualization» more  CDVE 2004»
14 years 2 months ago
Fostering Creativity in Cooperative Design
Creativity has become a valuable asset, given the fast paced changes most companies must nowadays deal with. Companies now look for creative, highly adaptive individuals who can ex...
Adriana Santarosa Vivacqua, Jano Moreira de Souza
CCS
2006
ACM
14 years 22 days ago
Evading network anomaly detection systems: formal reasoning and practical techniques
Attackers often try to evade an intrusion detection system (IDS) when launching their attacks. There have been several published studies in evasion attacks, some with available to...
Prahlad Fogla, Wenke Lee