Limit search to available items
Book Cover
E-book
Author CSCML (Symposium) (2nd : 2018 : Beersheba, Israel)

Title Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings / Itai Dinur, Shlomi Dolev, Sachin Lodha (eds.)
Published Cham, Switzerland : Springer, 2018

Copies

Description 1 online resource (xii, 287 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10879
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 10879. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Invited Paper -- Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors.-Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark -- Exploiting XSS Vulnerability in C & C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events
Summary This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope
Notes International conference proceedings
Includes author index
Online resource; title from PDF title page (SpringerLink, viewed June 20, 2018)
Subject Data encryption (Computer science) -- Congresses
Internet -- Security measures -- Congresses
Machine learning -- Congresses
Operating systems.
Information retrieval.
Data mining.
Ethical & social aspects of IT.
Network hardware.
Computer security.
Computers -- Operating Systems -- General.
Computers -- Information Technology.
Computers -- Database Management -- Data Mining.
Computers -- Social Aspects -- General.
Computers -- Hardware -- Network Hardware.
Computers -- Security -- General.
Data encryption (Computer science)
Internet -- Security measures
Machine learning
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Dinur, Itai, editor
Dolev, Shlomi, editor.
Lodha, Sachin, editor.
ISBN 9783319941479
331994147X
Other Titles CSCML 2018