International Journal of Man-Machine Studies - Special Issue: Knowledge Acquisition for Knowledge-based Systems. Part 5
Inferring decision trees using the minimum description length principle
Information and Computation
OPUS: preventing weak password choices
Computers and Security
C4.5: programs for machine learning
C4.5: programs for machine learning
Learning Sat-k-DNF formulas from membership queries
STOC '96 Proceedings of the twenty-eighth annual ACM symposium on Theory of computing
Optimizing decision trees through heuristically guided search
Communications of the ACM
Machine Learning
On the applications of multiplicity automata in learning
FOCS '96 Proceedings of the 37th Annual Symposium on Foundations of Computer Science
Estimation of Dependences Based on Empirical Data: Springer Series in Statistics (Springer Series in Statistics)
High dictionary compression for proactive password checking
ACM Transactions on Information and System Security (TISSEC)
A note on proactive password checking
Proceedings of the 2001 workshop on New security paradigms
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Popularity is everything: a new approach to protecting passwords from statistical-guessing attacks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Measuring password guessability for an entire university
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |