LEADER 01700nam 2200505zu 450 001 996248331403316 005 20210807005207.0 010 $a0-8014-7267-9 024 7 $a2027/heb09232 035 $a(CKB)3780000000081551 035 $a(SSID)ssj0001576086 035 $a(PQKBManifestationID)16245226 035 $a(PQKBTitleCode)TC0001576086 035 $a(PQKBWorkID)14854565 035 $a(PQKB)10136205 035 $a(dli)HEB09232 035 $a(MiU) MIU01100000000000000000322 035 $a(EXLCZ)993780000000081551 100 $a20160829d2005 uy 101 0 $aeng 135 $aurmnummmmuuuu 181 $ctxt 182 $cc 183 $acr 200 10$aMaking Enemies: War and State Building in Burma 210 31$a[Place of publication not identified]$cCornell University Press$d2005 215 $a1 online resource (xx, 268 p. ) $cill., maps 300 $aBibliographic Level Mode of Issuance: Monograph 320 $aIncludes bibliographical references (p. 229-260) and index. 517 $aMaking Enemies 606 $aSoutheast Asia$2HILCC 606 $aRegions & Countries - Asia & the Middle East$2HILCC 606 $aHistory & Archaeology$2HILCC 607 $aBurma$xPolitics and government$y1824-1948 607 $aBurma$xPolitics and government$y1948- 607 $aBurma$xArmed Forces$xPolitical activity 615 7$aSoutheast Asia 615 7$aRegions & Countries - Asia & the Middle East 615 7$aHistory & Archaeology 700 $aCallahan$b Mary P$01013478 801 0$bPQKB 906 $aBOOK 912 $a996248331403316 996 $aMaking Enemies: War and State Building in Burma$92357043 997 $aUNISA LEADER 02822nam 2200421 450 001 9910376542703321 005 20230831090749.0 010 $a1-4503-3826-7 024 7 $a10.1145/2808769 035 $a(CKB)3710000000729809 035 $a(Non_Seri)133228 035 $a(NjHacI)993710000000729809 035 $a(EXLCZ)993710000000729809 100 $a20230831d2015 uy 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 00$aAISec'15 $eproceedings of the 8th ACM Workshop on Artificial Intelligence and Security : October 16, 2015, Denver, Colorado, USA /$fIndrajit Ray [and five others], editors 210 1$aNew York, NY :$cAssociation for Computing Machinery,$d2015. 215 $a1 online resource (104 pages) $cillustrations 225 1 $aACM international conference proceedings series 300 $aIncludes index. 330 $aIt is our great pleasure to welcome you to the 2015 ACM Workshop Artificial Intelligence and Security (AISec 2015) -- the eighth annual workshop addressing technologies that fuse intelligent systems into computer security applications and the implications of these approaches. The papers to be presented in this year's program span topics ranging from adversarial learning, detecting fake OSN accounts, malware classification to privacy preserving data processing and game theoretic techniques in adversarial learning. The workshop's aim is to advance research at the intersection of artificial intelligence, machine learning, privacy and security. In particular, AISec gives researchers and practitioners working within one or more of those fields a platform for interdisciplinary discussion, which would otherwise be lacking. Hopefully, the workshop will lead to a high degree of cross-pollination between groups working across these areas. We are delighted to again be co-located with the premier ACM Computer and Communication Security (CCS 2015) conference. This year we had 25 submissions from Asia, Europe and North America. After a rigorous reviewing process, involving at 2-3 referees per paper, 11 papers were accepted for presentation at the workshop, including presentation-only papers. Apart from the main program, there will also be a keynote speech by Pratyusa Manadhata titled "Machine Learning for Enterprise Security". 410 0$aACM international conference proceedings series. 606 $aArtificial intelligence$vCongresses 606 $aComputer security$vCongresses 615 0$aArtificial intelligence 615 0$aComputer security 676 $a006.3015113 702 $aRay$b Indrajit 801 0$bNjHacI 801 1$bNjHacl 906 $aBOOK 912 $a9910376542703321 996 $aAISec'15$93436237 997 $aUNINA