skip to content
Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings Preview this item
ClosePreview this item
Checking...

Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings

Author: Itai Dinur; Shlomi Dolev; Sachin Lodha
Publisher: Cham, Switzerland : Springer, 2018.
Series: Lecture notes in computer science, 10879.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference papers and proceedings
Electronic books
Congresses
Additional Physical Format: Printed edition:
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Itai Dinur; Shlomi Dolev; Sachin Lodha
ISBN: 9783319941479 331994147X
OCLC Number: 1041140052
Notes: International conference proceedings.
Includes author index.
Description: 1 online resource (xii, 287 pages) : illustrations.
Contents: Invited Paper --
Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission --
Efficient Construction of the Kite Generator Revisited --
Using Noisy Binary Search for Differentially Private Anomaly Detection --
Distributed Web Mining of Ethereum --
An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors.-Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis --
Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors --
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs --
Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation --
Highway State Gating for Recurrent Highway Networks: Improving information flow through time --
Secured Data Gathering Protocol for IoT Networks --
Towards building active application defense systems --
Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems --
Brief Announcement: Image authentication using Hyperspectral layers --
Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks --
Intercepting a Stealthy Network --
Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs --
Detection in the Dark --
Exploiting XSS Vulnerability in C & C Panels as a New Technique to Detect Malwares --
A Planning Approach to Monitoring Computer Programs' Behavior --
Brief Announcement: Gradual Learning of Deep Recurrent Neural Network --
Brief Announcement: Adversarial Evasion of Western Electric Rules --
Brief Announcement: Deriving Context for Touch Events.
Series Title: Lecture notes in computer science, 10879.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: CSCML 2018
Responsibility: Itai Dinur, Shlomi Dolev, Sachin Lodha (eds.).

Abstract:

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.The 16  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1041140052> # Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
    a schema:CreativeWork, schema:MediaObject, schema:Book ;
    library:oclcnum "1041140052" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/sz> ;
    schema:about <http://dewey.info/class/005.824/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_information_technology> ; # Computers--Information Technology
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/ethical_&_social_aspects_of_it> ; # Ethical & social aspects of IT
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_security_general> ; # Computers--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_and_society> ; # Computers and Society
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_social_aspects_general> ; # Computers--Social Aspects--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/systems_and_data_security> ; # Systems and Data Security
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_database_management_data_mining> ; # Computers--Database Management--Data Mining
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_operating_systems_general> ; # Computers--Operating Systems--General
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/internet_security_measures> ; # Internet--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/data_mining_and_knowledge_discovery> ; # Data Mining and Knowledge Discovery
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computer_science> ; # Computer Science
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_hardware_network_hardware> ; # Computers--Hardware--Network Hardware
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/operating_systems> ; # Operating Systems
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/machine_learning> ; # Machine learning
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/data_mining> ; # Data mining
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/information_retrieval> ; # Information retrieval
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/data_encryption_computer_science> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/network_hardware> ; # Network hardware
    schema:about <http://experiment.worldcat.org/entity/work/data/4211328982#Topic/information_systems_applications_incl_internet> ; # Information Systems Applications (incl. Internet)
    schema:alternateName "CSCML 2018" ;
    schema:bookFormat schema:EBook ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/4211328982#Meeting/cscml_symposium_2nd_2018_beersheba_israel> ; # CSCML (Symposium) (2nd : 2018 : Beersheba, Israel)
    schema:datePublished "2018" ;
    schema:description "This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope."@en ;
    schema:description "Invited Paper -- Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors.-Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark -- Exploiting XSS Vulnerability in C & C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events."@en ;
    schema:editor <http://experiment.worldcat.org/entity/work/data/4211328982#Person/dolev_shlomi> ; # Shlomi Dolev
    schema:editor <http://experiment.worldcat.org/entity/work/data/4211328982#Person/lodha_sachin> ; # Sachin Lodha
    schema:editor <http://experiment.worldcat.org/entity/work/data/4211328982#Person/dinur_itai> ; # Itai Dinur
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4211328982> ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4211328982#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/4211328982#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/4211328982#CreativeWork/> ;
    schema:name "Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings"@en ;
    schema:productID "1041140052" ;
    schema:url <http://proxy.library.brocku.ca/login?url=http://link.springer.com/10.1007/978-3-319-94147-9> ;
    schema:url <https://link.springer.com/10.1007/978-3-319-94147-9> ;
    schema:url <http://uproxy.library.dc-uoit.ca/login?url=http://link.springer.com/10.1007/978-3-319-94147-9> ;
    schema:url <https://0-link-springer-com.pugwash.lib.warwick.ac.uk/10.1007/978-3-319-94147-9> ;
    schema:url <http://link.springer.com/10.1007/978-3-319-94147-9> ;
    schema:url <http://dx.doi.org/10.1007/978-3-319-94147-9> ;
    schema:url <https://ezproxy.library.dal.ca/login?url=https://doi.org/10.1007/978-3-319-94147-9> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-319-94146-2> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-319-94147-9> ;
    schema:workExample <http://worldcat.org/isbn/9783319941479> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB8M4010> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1041140052> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4211328982#Meeting/cscml_symposium_2nd_2018_beersheba_israel> # CSCML (Symposium) (2nd : 2018 : Beersheba, Israel)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/4211328982#Place/beersheba_israel> ; # Beersheba, Israel)
    schema:name "CSCML (Symposium) (2nd : 2018 : Beersheba, Israel)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Person/dinur_itai> # Itai Dinur
    a schema:Person ;
    schema:familyName "Dinur" ;
    schema:givenName "Itai" ;
    schema:name "Itai Dinur" ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Person/dolev_shlomi> # Shlomi Dolev
    a schema:Person ;
    schema:familyName "Dolev" ;
    schema:givenName "Shlomi" ;
    schema:name "Shlomi Dolev" ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Person/lodha_sachin> # Sachin Lodha
    a schema:Person ;
    schema:familyName "Lodha" ;
    schema:givenName "Sachin" ;
    schema:name "Sachin Lodha" ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Place/beersheba_israel> # Beersheba, Israel)
    a schema:Place ;
    schema:name "Beersheba, Israel)" ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1041140052> ; # Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1041140052> ; # Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_and_society> # Computers and Society
    a schema:Intangible ;
    schema:name "Computers and Society"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_database_management_data_mining> # Computers--Database Management--Data Mining
    a schema:Intangible ;
    schema:name "Computers--Database Management--Data Mining"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_hardware_network_hardware> # Computers--Hardware--Network Hardware
    a schema:Intangible ;
    schema:name "Computers--Hardware--Network Hardware"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_information_technology> # Computers--Information Technology
    a schema:Intangible ;
    schema:name "Computers--Information Technology"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_operating_systems_general> # Computers--Operating Systems--General
    a schema:Intangible ;
    schema:name "Computers--Operating Systems--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_security_general> # Computers--Security--General
    a schema:Intangible ;
    schema:name "Computers--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/computers_social_aspects_general> # Computers--Social Aspects--General
    a schema:Intangible ;
    schema:name "Computers--Social Aspects--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/data_encryption_computer_science> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/data_mining_and_knowledge_discovery> # Data Mining and Knowledge Discovery
    a schema:Intangible ;
    schema:name "Data Mining and Knowledge Discovery"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/ethical_&_social_aspects_of_it> # Ethical & social aspects of IT
    a schema:Intangible ;
    schema:name "Ethical & social aspects of IT"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/information_retrieval> # Information retrieval
    a schema:Intangible ;
    schema:name "Information retrieval"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/information_systems_applications_incl_internet> # Information Systems Applications (incl. Internet)
    a schema:Intangible ;
    schema:name "Information Systems Applications (incl. Internet)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/internet_security_measures> # Internet--Security measures
    a schema:Intangible ;
    schema:name "Internet--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/operating_systems> # Operating Systems
    a schema:Intangible ;
    schema:name "Operating Systems"@en ;
    schema:name "Operating systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4211328982#Topic/systems_and_data_security> # Systems and Data Security
    a schema:Intangible ;
    schema:name "Systems and Data Security"@en ;
    .

<http://uproxy.library.dc-uoit.ca/login?url=http://link.springer.com/10.1007/978-3-319-94147-9>
    rdfs:comment "eBook available for UOIT via SpringerLink. Click link to access" ;
    .

<http://worldcat.org/entity/work/data/4211328982#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1041140052> ; # Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
    .

<http://worldcat.org/isbn/9783319941479>
    a schema:ProductModel ;
    schema:isbn "331994147X" ;
    schema:isbn "9783319941479" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1041140052> ; # Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/1041140052>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1041140052> ; # Cyber security cryptography and machine learning : second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings
    schema:dateModified "2019-04-16" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .

<https://ezproxy.library.dal.ca/login?url=https://doi.org/10.1007/978-3-319-94147-9>
    rdfs:comment "Unlimited Access available" ;
    rdfs:comment "Access restricted: DAL users only" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.