Limit search to available items
Book Cover
E-book
Author CSCML (Symposium) (1st : 2017 : Beersheba, Israel)

Title Cyber security cryptography and machine learning : first International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / Shlomi Dolev, Sachin Lodha (eds.)
Published Cham, Switzerland : Springer, 2017

Copies

Description 1 online resource (xii, 307 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 10332
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 10332. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology
Contents Cyber security.-Secure software development methodologies, formal methods semantics and verification of secure systems.-Fault tolerance, reliability, availability of distributed secure systems.- Game-theoretic approaches to secure computing.- Automatic recovery of self-stabilizing and self-organizing systems.- Communication, authentication and identification security.- Cyber security for mobile and Internet of things.- Cyber security of corporations.- Security and privacy for cloud, edge and fog computing.-Ccryptography.- Cryptographic implementation analysis and construction.- Secure multi-party computation.- Privacy-enhancing technologies and anonymity.- Post-quantum cryptography and security.- Machine learning and big data.- Anomaly detection and malware identification.- Business intelligence and security.- Digital forensics.- Digital rights management; trust management and reputation systems.- Information retrieval, risk analysis, DoS
Summary This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS
Notes Includes author index
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed June 22, 2017)
Subject Data encryption (Computer science) -- Congresses
Internet -- Security measures -- Congresses
Machine learning -- Congresses
Coding theory & cryptology.
Artificial intelligence.
Computer vision.
Discrete mathematics.
Computer security.
Computers -- Security -- General.
Computers -- Intelligence (AI) & Semantics.
Computers -- Computer Vision & Pattern Recognition.
Computers -- Data Processing.
Data encryption (Computer science)
Internet -- Security measures
Machine learning
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Dolev, Shlomi, editor
Lodha, Sachin, editor
ISBN 9783319600802
331960080X
Other Titles CSCML 2017