Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security
Abstract
Index Terms
- Workshop Summary of AISec'14: 2014 Workshop on Artificial Intelligent and Security
Recommendations
Workshop Summary of AISec'15: 2015 Workshop on Artificial Intelligent and Security
CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications SecurityIt is our great pleasure to welcome you to the 2015 ACM Workshop Artificial Intelligence and Security (AISec 2015) - the eight annual workshop addressing technologies that fuse intelligent systems into computer security applications and the implications ...
CCS'14 Co-Located Workshop Summary for SPSM 2014
CCS '14: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications SecuritySecurity and privacy in smartphones and mobile devices is an emerging area which has received significant attention from the research community during the past few years. The SPSM workshop was created to bring together these researchers and ...
CCS'13 co-located workshop summary for SPSM 2013
CCS '13: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications securitySecurity and privacy in smartphones and mobile devices is an emerging area which has received significant attention from the research community during the past few years. The SPSM workshop was created to bring together these researchers and ...
Comments
Information & Contributors
Information
Published In
- General Chair:
- Gail-Joon Ahn,
- Program Chairs:
- Moti Yung,
- Ninghui Li
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Tutorial
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 168Total Downloads
- Downloads (Last 12 months)4
- Downloads (Last 6 weeks)1
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in