Probabilistic reasoning in intelligent systems: networks of plausible inference
Probabilistic reasoning in intelligent systems: networks of plausible inference
Learning DFA representations of HTTP for protecting web applications
Computer Networks: The International Journal of Computer and Telecommunications Networking
Saner: Composing Static and Dynamic Analysis to Validate Sanitization in Web Applications
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Robust defenses for cross-site request forgery
Proceedings of the 15th ACM conference on Computer and communications security
Cybersecurity and Artificial Intelligence: From Fixing the Plumbing to Smart Water
IEEE Security and Privacy
XSS Attacks: Cross Site Scripting Exploits and Defense
XSS Attacks: Cross Site Scripting Exploits and Defense
Detection and analysis of drive-by-download attacks and malicious JavaScript code
Proceedings of the 19th international conference on World wide web
Exploiting execution context for the detection of anomalous system calls
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Swaddler: an approach for the anomaly-based detection of state violations in web applications
RAID'07 Proceedings of the 10th international conference on Recent advances in intrusion detection
Knowledge-Based Systems
Hi-index | 0.00 |
A position paper toward an important and urgent discussion on how best use the potential of Artificial Intelligence in the context of cybersecurity. AI is often mentioned in papers on cybersecurity. But what is meant is using pre-existing AI techniques in cybersecurity. AI techniques are developed around applications. Cybersecurity has never been an area of concentration in AI. In this paper we argue that cybersecurity calls for new and specific AI techniques developed with that kind of application in mind. In practice, this paper is based on a broad overview of different approaches, which have the potential to be game changers in cybersecurity. This paper focuses on web application security and advocates the use of Knowledge Based Systems, probabilistic reasoning and Bayesian updating to control the probability of false positives and false negatives.