1. 1987: Denning published \An Intrusion Detection System" , first framing security as a learning problem
D. E. Denning, “ An intrusion-detection model," IEEE Trans. Softw. Eng., 1987.
2. 1998: DARPA IDS design challenge
(1998) Darpa intrusion detection evaluation. [Online].Available: http://www.ll.mit.edu/ideval/data/
3. 1999: KDD Cup IDS design challenge
(1999) Kdd cup 1999 data. [Online]. Available: http://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html
C. Elkan. (1999) Results of the kdd’99 classifierlearning contest. [Online]. Available: http://cseweb.ucsd.edu/~elkan/clresults.html
4. 2008: CCS hosted the 1st AISec workshop. Continues to operate each year
(2016) Aisec 2016 topic classifications. [Online].Available:
http://teamcore.usc.edu/people/arunesh/AISec2016/call-for-papers.html
5. 2007, 2008: Twice, KDD hosted the International Workshop on Privacy, Security, and Trust(PinKDD)
KDD. (2008) 2008 2nd pinkdd report. [Online]. Available:
http://dl.acm.org/citation.cfm?id=1540296&dl=ACM&coll=DL&CFID=642625736&CFTOKEN=16618422
6. 2010, 2012: Twice, KDD hosted Intelligence and Security Informatics Workshop(ISI)
(2010) 2010 kdd intelligence and security informatics workshop. [Online]. Available:
http://dl.acm.org/citation.cfm?id=1938606
(2012) 2012 kdd intelligence and security informatics workshop. [Online]. Available:
http://cci.drexel.edu/isi/isi-kdd2012/
7. 2011: \Adversarial Machine Learning"published in 4th AISec
L. Huang, A. D. Joseph, B. Nelson, B. I. Rubinstein,and J. Tygar, ”Adversarial machine learning,"in AISec2011.
8. 2012: \Privacy and Cybersecurity: The Next 100 Years" by Landwe hr et al published
C. Landwehr, D. Boneh, J. C. Mitchell, S. M. Bellovin,S. Landau, and M. E. Lesk, \Privacy and cybersecurity: The next 100 years," Proceedings of the IEEE,vol. 100, no. Special Centennial Issue, 2012.
9. 2013: Manifesto from Dagstuhl Perspectives Workshop published as \Machine Learning Methods for Computer Security" by Joseph et al .
A. D. Joseph, P. Laskov, F. Roli, J. Tygar, and B. Nelson, \Dagstuhl Manifestos, Volume 3, Issue 1, January to December 2013, Complete Issue," Dagstuhl Manifestos, 2014.
10. 2014: KDD hosted its 1st \Security & Privacy" session in the main conference program[37]
KDD. (2014) 2014 kdd security and privacy session.[Online]. Available: http://dl.acm.org/citation.cfm?id=2623330
11. 2014: ICML hosted its 1st, and so far the only workshop on Learning, Security, and Privacy(LSP)[38]
ICML. (2014) Icml 2014 workshop on learning,security and privacy. [Online]. Available: https://sites.google.com/site/learnsecprivacy2014/
12. 2016: AAAI hosted its 1st Artificial Intelligence for Cyber Security workshop(AISC)
AAAI. Aaai 2016 workshop aisc. [Online]. Available: http://www-bcf.usc.edu/~aruneshs/AICS2016/index.html