Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings /

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submiss...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Dinur, Itai (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Dolev, Shlomi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Lodha, Sachin (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2018.
Έκδοση:1st ed. 2018.
Σειρά:Security and Cryptology ; 10879
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission
  • Efficient Construction of the Kite Generator Revisited
  • Using Noisy Binary Search for Differentially Private Anomaly Detection
  • Distributed Web Mining of Ethereum
  • An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis
  • Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors
  • Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs
  • Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation
  • Highway State Gating for Recurrent Highway Networks: Improving information flow through time
  • Secured Data Gathering Protocol for IoT Networks
  • Towards building active application defense systems
  • Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems
  • Brief Announcement: Image authentication using Hyperspectral layers
  • Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks
  • Intercepting a Stealthy Network
  • Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs
  • Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares
  • A Planning Approach to Monitoring Computer Programs' Behavior
  • Brief Announcement: Gradual Learning of Deep Recurrent Neural Network
  • Brief Announcement: Adversarial Evasion of Western Electric Rules
  • Brief Announcement: Deriving Context for Touch Events.