Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1866423acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
AISec '10: Proceedings of the 3rd ACM workshop on Artificial intelligence and security
ACM2010 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS '10: 17th ACM Conference on Computer and Communications Security 2010 Chicago Illinois USA 8 October 2010
ISBN:
978-1-4503-0088-9
Published:
08 October 2010
Sponsors:
Recommend ACM DL
ALREADY A SUBSCRIBER?SIGN IN
Next Conference
October 13 - 17, 2025
Taipei , Taiwan
Reflects downloads up to 20 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

It is my great pleasure to welcome you to the 2010 ACM Workshop on Artificial Intelligence and Security -- AISec'10. This year's workshop continues its tradition of being a premier forum for presentation of research results and position papers that bridge the gap between the artificial intelligence and security communities. We also continue our relationship with the ACM Computer and Communications Security Conference (CCS 2010).

This will be the third workshop on Security and Artificial Intelligence. Techniques from artificial intelligence (notably bayesian learning and captchas) have achieved great success in helping administrators manage automated attacks such as SPAM and network attacks that would overwhelm human capacities. The proliferation of data and data mining techniques has important implications for security and privacy. However, the scientific foundation for the use of these techniques in adversarial contexts contains many open questions, other AI techniques are being applied to security applications, and as AI technologies (like autonomous vehicles) become increasingly mainstream, their security properties become increasingly important.

The call for papers attracted 15 submissions from 6 countries on 3 continents. The program committee accepted 5 full papers and 5 short papers that cover a variety of security applications from malware detection to social network privacy and use a variety of AI techniques from machine learning to adjustable autonomy.

Skip Table Of Content Section
SESSION: Wireless security and position papers 1
research-article
Towards modeling the behavior of physical intruders in a region monitored by a wireless sensor network

A priority task for homeland security is the coverage of large spans of open border that cannot be continuously physically monitored for intrusion. Low-cost monitoring solutions based on wireless sensor networks have been identified as an effective ...

research-article
Eliminating routing protocol anomalies in wireless sensor networks using AI techniques

The specific nature of routing in sensor networks has made possible new sorts of attacks that can have closer insight and effect on the networks packets, the most important being the packet tampering. Routing attacks on the network level are the first ...

research-article
Empirical evaluation of authorship obfuscation using JGAAP

Authorship attribution is an important emerging security tool. However, just as criminals may wear gloves to hide their fingerprints, so authors may choose to mask their style to escape detection. Most authorship studies have focused on cooperative and/...

research-article
Towards security policy decisions based on context profiling

With the increasing popularity of personal mobile devices like smartphones, more and more ordinary users create and consume valuable, private and sensitive data such as photos, videos, messages, documents as well as access credentials for various ...

SESSION: Keynote address and session 2
research-article
The limits of automatic OS fingerprint generation

Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can be subtle and difficult to find, most fingerprinting tools require expert ...

SESSION: Network security and position papers 2
research-article
Relational network-service clustering analysis with set evidences

Network administrators are faced with a large amount of network data that they need to sift through to analyze user behaviors and detect anomalies. Through a network monitoring tool, we obtained TCP and UDP connection records together with additional ...

research-article
Synthetic security policy generation via network traffic clustering

Security policies are an essential part in the operations of any networking system. Test policies are always needed for conducting research and development. Such policies are required in various phases of research related to many problems as performance ...

research-article
Lexical feature based phishing URL detection using online learning

Phishing is a form of cybercrime where spammed emails and fraudulent websites entice victims to provide sensitive information to the phishers. The acquired sensitive information is subsequently used to steal identities or gain access to money. This ...

research-article
Cheap and automated socio-technical attacks based on social networking sites

The vastly and steadily increasing data pool collected by social networking sites can have severe implications once this information becomes available to attackers. Whilst socio-technical attacks such as social engineering relied upon expensive ...

research-article
Adjustable autonomy for cross-domain entitlement decisions

Cross-domain information exchange is a growing problem, as business and governmental organizations increasingly need to integrate their information systems with those of partially trusted partners. Current identity management and access control ...

Contributors
  • New York University

Recommendations

Acceptance Rates

AISec '10 Paper Acceptance Rate 10 of 15 submissions, 67%;
Overall Acceptance Rate 94 of 231 submissions, 41%
YearSubmittedAcceptedRate
AISec '1832928%
AISec '17361131%
AISec '16381232%
AISec '15251144%
AISec '14241250%
AISec '13171059%
AISec '12241042%
AISec '10151067%
AISec '0820945%
Overall2319441%