机器学习与信息安全重大里程碑

1. 1987: Denning published \An Intrusion Detection System" , first framing security as a learning problem

D. E. Denning, “  An intrusion-detection model," IEEE Trans. Softw. Eng., 1987.

2. 1998: DARPA IDS design challenge

(1998) Darpa intrusion detection evaluation. [Online].Available: http://www.ll.mit.edu/ideval/data/

3. 1999: KDD Cup IDS design challenge

(1999) Kdd cup 1999 data. [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
C. Elkan. (1999) Results of the kdd’99 classifierlearning contest. [Online]. Available: http://cseweb.ucsd.edu/~elkan/clresults.html


4. 2008: CCS hosted the 1st AISec workshop. Continues to operate each year

(2016) Aisec 2016 topic classifications. [Online].Available: 

http://teamcore.usc.edu/people/arunesh/AISec2016/call-for-papers.html

5. 2007, 2008: Twice, KDD hosted the International Workshop on Privacy, Security, and Trust(PinKDD)

KDD. (2008) 2008 2nd pinkdd report. [Online]. Available: 

http://dl.acm.org/citation.cfm?id=1540296&dl=ACM&coll=DL&CFID=642625736&CFTOKEN=16618422

6. 2010, 2012: Twice, KDD hosted Intelligence and Security Informatics Workshop(ISI)

(2010) 2010 kdd intelligence and security informatics workshop. [Online]. Available: 

http://dl.acm.org/citation.cfm?id=1938606

(2012) 2012 kdd intelligence and security informatics workshop. [Online]. Available: 

http://cci.drexel.edu/isi/isi-kdd2012/

7. 2011: \Adversarial Machine Learning"published in 4th AISec

L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein,and J. Tygar, ”Adversarial machine learning,"in AISec2011.

8. 2012: \Privacy and Cybersecurity: The Next 100 Years" by Landwe hr et al published

C. Landwehr, D. Boneh, J. C. Mitchell, S. M. Bellovin,S. Landau, and M. E. Lesk, \Privacy and cybersecurity: The next 100 years," Proceedings of the IEEE,vol. 100, no. Special Centennial Issue, 2012.

9. 2013: Manifesto from Dagstuhl Perspectives Workshop published as \Machine Learning Methods for Computer Security" by Joseph et al .

A. D. Joseph, P. Laskov, F. Roli, J. Tygar, and B. Nelson, \Dagstuhl Manifestos, Volume 3, Issue 1, January to December 2013, Complete Issue," Dagstuhl Manifestos, 2014.

10. 2014: KDD hosted its 1st \Security & Privacy" session in the main conference program[37]

KDD. (2014) 2014 kdd security and privacy session.[Online]. Available: http://dl.acm.org/citation.cfm?id=2623330

11. 2014: ICML hosted its 1st, and so far the only workshop on Learning, Security, and Privacy(LSP)[38]

ICML. (2014) Icml 2014 workshop on learning,security and privacy. [Online]. Available: https://sites.google.com/site/learnsecprivacy2014/

12. 2016: AAAI hosted its 1st Artificial Intelligence for Cyber Security workshop(AISC)

AAAI. Aaai 2016 workshop aisc. [Online]. Available: http://www-bcf.usc.edu/~aruneshs/AICS2016/index.html

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值