Cyber Security Cryptography and Machine Learning Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings /
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submiss...
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Cham :
Springer International Publishing : Imprint: Springer,
2018.
|
Έκδοση: | 1st ed. 2018. |
Σειρά: | Security and Cryptology ;
10879 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission
- Efficient Construction of the Kite Generator Revisited
- Using Noisy Binary Search for Differentially Private Anomaly Detection
- Distributed Web Mining of Ethereum
- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis
- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors
- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs
- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation
- Highway State Gating for Recurrent Highway Networks: Improving information flow through time
- Secured Data Gathering Protocol for IoT Networks
- Towards building active application defense systems
- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems
- Brief Announcement: Image authentication using Hyperspectral layers
- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks
- Intercepting a Stealthy Network
- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs
- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares
- A Planning Approach to Monitoring Computer Programs' Behavior
- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network
- Brief Announcement: Adversarial Evasion of Western Electric Rules
- Brief Announcement: Deriving Context for Touch Events.