Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings /: second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings. (2018)
- Record Type:
- Book
- Title:
- Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings /: second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings. (2018)
- Main Title:
- Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
- Other Titles:
- CSCML 2018
- Further Information:
- Note: Itai Dinur, Shlomi Dolev, Sachin Lodha (eds.).
- Editors:
- Dinur, Itai
Dolev, Shlomi
Lodha, Sachin - Other Names:
- CSCML (Symposium), 2nd
- Contents:
- Invited Paper -- Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark -- Exploiting XSS Vulnerability in C&C Panels as a New Technique to DetectInvited Paper -- Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark -- Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events. … (more)
- Publisher Details:
- Cham, Switzerland : Springer
- Publication Date:
- 2018
- Extent:
- 1 online resource (xii, 287 pages), illustrations
- Subjects:
- 005.8/24
Computer science
Data encryption (Computer science) -- Congresses
Internet -- Security measures -- Congresses
Machine learning -- Congresses
Data encryption (Computer science)
Internet -- Security measures
Machine learning
Computer Science
Systems and Data Security
Operating Systems
Information Systems Applications (incl. Internet)
Data Mining and Knowledge Discovery
Computers and Society
Computer Communication Networks
Computers -- Operating Systems -- General
Computers -- Information Technology
Computers -- Database Management -- Data Mining
Computers -- Social Aspects -- General
Computers -- Hardware -- Network Hardware
Operating systems
Information retrieval
Data mining
Ethical & social aspects of IT
Network hardware
Computer security
Operating systems (Computers)
Data mining
Computer Communication Networks
Computers -- Security -- General
Computer security
Electronic books
Conference papers and proceedings - Languages:
- English
- ISBNs:
- 9783319941479
- Related ISBNs:
- 331994147X
9783319941462
3319941461 - Notes:
- Note: Online resource; title from PDF title page (SpringerLink, viewed June 20, 2018).
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.358893
- Ingest File:
- 01_320.xml