Back to Results
First PageMeta Content
National security / Defence in depth / Military geography / Military strategy / Proactivity / Security through obscurity / SecurID / Attack / Force concentration / Military science / Security / Computer network security


A Learning-Based Approach to Reactive Security
Add to Reading List

Document Date: 2010-03-09 17:35:23


Open Document

File Size: 366,95 KB

Share Result on Facebook

City

Mountain View / /

Company

iSEC Partners / UC Berkeley 3 Google Inc. / /

IndustryTerm

software system / enterprise web applications / reactive algorithm / reactive defense algorithm / cross-site / particular web application / enterprise web application / database server / multiplicative update learning algorithm / online learning theory literature / simpli ed data center network / front-end server / rst server / online learning theory / data center network / online learning / online learning literature / front-end web server / back-end database server / web application rewall / Internet Fraud Battle eld / /

Organization

Computer Science Division / Department of Computer Science / Stanford University / UC Berkeley / /

Person

Peter L. Bartlett / Benjamin I. P. Rubinstein / /

Position

Chief Information Security / /

ProgrammingLanguage

SQL / /

Technology

reactive algorithm / machine learning / reactive defense algorithm / same algorithm / web server / multiplicative update learning algorithm / /

SocialTag