Sciweavers

8381 search results - page 7 / 1677
» The security of machine learning
Sort
View
COMPSEC
2006
141views more  COMPSEC 2006»
13 years 7 months ago
Comparing Java and .NET security: Lessons learned and missed
Many systems execute untrusted programs in virtual machines (VMs) to limit their access to system resources. Sun introduced the Java VM in 1995, primarily intended as a lightweigh...
Nathanael Paul, David Evans
SAC
2005
ACM
14 years 27 days ago
Privacy preserving learning in negotiation
Machine learning techniques are widely used in negotiation systems. To get more accurate and satisfactory learning results, negotiation parties have the desire to employ learning ...
Sheng Zhang, Fillia Makedon
IEEECIT
2010
IEEE
13 years 5 months ago
Learning Autonomic Security Reconfiguration Policies
Abstract--We explore the idea of applying machine learning techniques to automatically infer risk-adaptive policies to reconfigure a network security architecture when the context ...
Juan E. Tapiador, John A. Clark
ICALT
2008
IEEE
14 years 1 months ago
Secure Certification for ePortfolios
Students often build up portfolios of their achievements as they study and present them when they apply for jobs or for further study. Of increasing interest is the concept of an ...
Lisha Chen-Wilson, Patrick Newcombe, Piers Royce, ...