Limit search to available items
Book Cover
E-book
Author CSCML (Symposium) (3rd : 2019 : Beersheba, Israel)

Title Cyber security cryptography and machine learning : third International Symposium, CSCML 2018, Beer Sheva, Israel, June 27-28, 2019, proceedings / Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung (eds.)
Published Cham, Switzerland : Springer, [2019]
©2019

Copies

Description 1 online resource (xiii, 330 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 11527
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 11527. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Contents Jamming Strategies in Covert Communication / Ori Shmuel, Asaf Cohen, Omer Gurewitz -- Linear Cryptanalysis Reduced Round of Piccolo-80 -- Tomer Ashur, Orr Dunkelman, Nael Masalha -- Continuous Key Agreement with Reduced Bandwidth / Nir Drucker, Shay Gueron -- Covert Channel Cyber-Attack over Video Stream DCT Payload / Yoram Segal, Ofer Hadar -- Effects of Weather on Drone to IoT QKD / Shlomi Arnon, Judy Kupferman -- Malware Classification Using Image Representation / Ajay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla -- MLDStore / Philip Derbeko, Shlomi Dolev, Ehud Gudes -- Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement) -- Elisabeth Drayer, Tirza Routtenberg -- Beyond Replications in Blockchain / Shlomi Dolev, Yuval Poleg -- Self-stabilizing Byzantine Consensus for Blockchain / Alexander Binun, Shlomi Dolev, Tal Hadad -- The Advantage of Truncated Permutations / Shoni Gilboa, Shay Gueron -- Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution / Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu -- Generating a Random String with a Fixed Weight / Nir Drucker, Shay Gueron -- An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes -- Enhancing Image Steganalysis with Adversarially Generated Examples / Kevin Alex Zhang, Kalyan Veeramachaneni -- Controllable Privacy Preserving Blockchain / Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba -- A Relay Attack on a Tamper Detection System (Brief Announcement) -- Itai Dinur, Natan Elul -- Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement) -- Ron Shoham, Haim Permuter -- Governance and Regulations Implications on Machine Learning (Brief Announcement) -- Sima Nadler, Orna Raz, Marcel Zalmanovici -- Simulating Homomorphic Evaluation of Deep Learning Predictions / Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev -- Everything Is in the Name -- A URL Based Approach for Phishing Detection / Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha -- Network Cloudification / Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin -- New Goal Recognition Algorithms Using Attack Graphs / Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner -- PeerClear: Peer-to-Peer Bot-net Detection / Amit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla -- Rethinking Identification Protocols from the Point of View of the GDPR / Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen -- Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement) -- Meir Kalech, Amit Shlomo, Robert Moskovich -- Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement) -- Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik -- Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement) -- Vasiliki Liagkou, Paul Spirakis, Yannis C. Stamatiou
Summary "This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas."--Publisher's website
Notes International conference proceedings
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed July 4, 2019)
Subject Data encryption (Computer science) -- Congresses
Internet -- Security measures -- Congresses
Machine learning -- Congresses
Data encryption (Computer science)
Internet -- Security measures
Machine learning
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Dolev, Shlomi, editor.
Hendler, Danny, editor
Lodha, Sachin, editor.
Yung, Moti, editor
ISBN 9783030209513
3030209512
Other Titles CSCML 2019