عرض عادي

Cyber security cryptography and machine learning : third International Symposium, CSCML 2018, Beer Sheva, Israel, June 27-28, 2019, proceedings / Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung (eds.)

بواسطة:المساهم (المساهمين):نوع المادة : نصنصاللغة: الإنجليزية السلاسل:Lecture notes in computer science ; 11527. | LNCS sublibrary. SL 4, Security and cryptologyالناشر:Cham, Switzerland : Springer, 2019تاريخ حقوق النشر: ©2019وصف:xiii, 330 pages : illustrations; 25 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9783030209506
  • 9783030209513
  • 3030209512
عنوان آخر:
  • CSCML 2019
الموضوع:تصنيف مكتبة الكونجرس:
  • QA76.9.A25 C934 2019
المحتويات:
Jamming Strategies in Covert Communication / Ori Shmuel, Asaf Cohen, Omer Gurewitz -- Linear Cryptanalysis Reduced Round of Piccolo-80 -- Tomer Ashur, Orr Dunkelman, Nael Masalha -- Continuous Key Agreement with Reduced Bandwidth / Nir Drucker, Shay Gueron -- Covert Channel Cyber-Attack over Video Stream DCT Payload / Yoram Segal, Ofer Hadar -- Effects of Weather on Drone to IoT QKD / Shlomi Arnon, Judy Kupferman -- Malware Classification Using Image Representation / Ajay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla -- MLDStore / Philip Derbeko, Shlomi Dolev, Ehud Gudes -- Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement) -- Elisabeth Drayer, Tirza Routtenberg -- Beyond Replications in Blockchain / Shlomi Dolev, Yuval Poleg -- Self-stabilizing Byzantine Consensus for Blockchain / Alexander Binun, Shlomi Dolev, Tal Hadad -- The Advantage of Truncated Permutations / Shoni Gilboa, Shay Gueron -- Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution / Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu -- Generating a Random String with a Fixed Weight / Nir Drucker, Shay Gueron -- An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes -- Enhancing Image Steganalysis with Adversarially Generated Examples / Kevin Alex Zhang, Kalyan Veeramachaneni -- Controllable Privacy Preserving Blockchain / Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba -- A Relay Attack on a Tamper Detection System (Brief Announcement) -- Itai Dinur, Natan Elul -- Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement) -- Ron Shoham, Haim Permuter -- Governance and Regulations Implications on Machine Learning (Brief Announcement) -- Sima Nadler, Orna Raz, Marcel Zalmanovici -- Simulating Homomorphic Evaluation of Deep Learning Predictions / Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev -- Everything Is in the Name - A URL Based Approach for Phishing Detection / Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha -- Network Cloudification / Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin -- New Goal Recognition Algorithms Using Attack Graphs / Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner -- PeerClear: Peer-to-Peer Bot-net Detection / Amit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla -- Rethinking Identification Protocols from the Point of View of the GDPR / Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen -- Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement) -- Meir Kalech, Amit Shlomo, Robert Moskovich -- Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement) -- Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik -- Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement) -- Vasiliki Liagkou, Paul Spirakis, Yannis C. Stamatiou
ملخص:"This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas."--Publisher's website
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 C934 2019 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30030000002273
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة QA76.9.A25 C934 2019 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30030000002274

International conference proceedings

Includes bibliographical references and author index

Jamming Strategies in Covert Communication / Ori Shmuel, Asaf Cohen, Omer Gurewitz -- Linear Cryptanalysis Reduced Round of Piccolo-80 -- Tomer Ashur, Orr Dunkelman, Nael Masalha -- Continuous Key Agreement with Reduced Bandwidth / Nir Drucker, Shay Gueron -- Covert Channel Cyber-Attack over Video Stream DCT Payload / Yoram Segal, Ofer Hadar -- Effects of Weather on Drone to IoT QKD / Shlomi Arnon, Judy Kupferman -- Malware Classification Using Image Representation / Ajay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla -- MLDStore / Philip Derbeko, Shlomi Dolev, Ehud Gudes -- Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement) -- Elisabeth Drayer, Tirza Routtenberg -- Beyond Replications in Blockchain / Shlomi Dolev, Yuval Poleg -- Self-stabilizing Byzantine Consensus for Blockchain / Alexander Binun, Shlomi Dolev, Tal Hadad -- The Advantage of Truncated Permutations / Shoni Gilboa, Shay Gueron -- Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution / Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu -- Generating a Random String with a Fixed Weight / Nir Drucker, Shay Gueron -- An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes -- Enhancing Image Steganalysis with Adversarially Generated Examples / Kevin Alex Zhang, Kalyan Veeramachaneni -- Controllable Privacy Preserving Blockchain / Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba -- A Relay Attack on a Tamper Detection System (Brief Announcement) -- Itai Dinur, Natan Elul -- Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement) -- Ron Shoham, Haim Permuter -- Governance and Regulations Implications on Machine Learning (Brief Announcement) -- Sima Nadler, Orna Raz, Marcel Zalmanovici -- Simulating Homomorphic Evaluation of Deep Learning Predictions / Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev -- Everything Is in the Name - A URL Based Approach for Phishing Detection / Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha -- Network Cloudification / Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin -- New Goal Recognition Algorithms Using Attack Graphs / Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner -- PeerClear: Peer-to-Peer Bot-net Detection / Amit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla -- Rethinking Identification Protocols from the Point of View of the GDPR / Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen -- Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement) -- Meir Kalech, Amit Shlomo, Robert Moskovich -- Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement) -- Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik -- Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement) -- Vasiliki Liagkou, Paul Spirakis, Yannis C. Stamatiou

Available to OhioLINK libraries

"This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019. The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas."--Publisher's website

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة