Atjaunināt sīkdatņu piekrišanu

Cyber Security Cryptography and Machine Learning: Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 2728, 2019, Proceedings 2019 ed. [Mīkstie vāki]

Edited by , Edited by , Edited by , Edited by
  • Formāts: Paperback / softback, 330 pages, height x width: 235x155 mm, weight: 528 g, 76 Illustrations, color; 65 Illustrations, black and white; XIII, 330 p. 141 illus., 76 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11527
  • Izdošanas datums: 19-May-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030209504
  • ISBN-13: 9783030209506
  • Mīkstie vāki
  • Cena: 61,19 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 71,99 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 330 pages, height x width: 235x155 mm, weight: 528 g, 76 Illustrations, color; 65 Illustrations, black and white; XIII, 330 p. 141 illus., 76 illus. in color., 1 Paperback / softback
  • Sērija : Security and Cryptology 11527
  • Izdošanas datums: 19-May-2019
  • Izdevniecība: Springer Nature Switzerland AG
  • ISBN-10: 3030209504
  • ISBN-13: 9783030209506

This book constitutes the refereed proceedings of the Third International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2019, held in Beer-Sheva, Israel, in June 2019.

The 18 full and 10 short papers presented in this volume were carefully reviewed and selected from 36 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Jamming Strategies in Covert Communication
1(15)
Ori Shmuel
Asaf Cohen
Omer Gurewitz
Linear Cryptanalysis Reduced Round of Piccolo-80
16(17)
Tomer Ashur
Orr Dunkelman
Nael Masalha
Continuous Key Agreement with Reduced Bandwidth
33(14)
Mr Drucker
Shay Gueron
Covert Channel Cyber-Attack over Video Stream DCT Payload (Copyright Protection Algorithm for Video and Audio Streams)
47(20)
Yoram Segal
Ofer Hadar
Effects of Weather on Drone to IoT QKD
67(8)
Shlomi Arnon
Judy Kupferman
Malware Classification Using Image Representation
75(18)
Ajay Singh
Anand Handa
Nilesh Kumar
Sandeep Kumar Shukla
MLDStore: DNNs as Similitude Models for Sharing Big Data (Brief Announcement)
93(4)
Philip Derbeko
Shlomi Dolev
Ehud Gudes
Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement)
97(4)
Elisabeth Drayer
Tirza Routtenberg
Beyond Replications in Blockchain: On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement)
101(5)
Shlomi Dolev
Yuval Poleg
Self-stabilizing Byzantine Consensus for Blockchain (Brief Announcement)
106(5)
Alexander Binun
Shlomi Dolev
Tal Hadad
The Advantage of Truncated Permutations
111(10)
Shoni Gilboa
Shay Gueron
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution
121(20)
Luca Borzacchiello
Emilio Coppa
Daniele Cono D'Elia
Camil Demetrescu
Generating a Random String with a Fixed Weight
141(15)
Mr Drucker
Shay Gueron
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility
156(13)
Nadav Voloch
Priel Levy
Mor Elmakies
Ehud Gudes
Enhancing Image Steganalysis with Adversarially Generated Examples
169(9)
Kevin Alex Zhang
Kalyan Veeramachaneni
Controllable Privacy Preserving Blockchain: FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities
178(20)
Rami Puzis
Guy Barshap
Polina Zilberman
Oded Leiba
A Relay Attack on a Tamper Detection System (Brief Announcement)
198(4)
Itai Dinur
Natan Elul
Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement)
202(6)
Ron Shoham
Haim Permuter
Governance and Regulations Implications on Machine Learning (Brief Announcement)
208(4)
Sinta Nadler
Orna Raz
Marcel Zalmanovici
Simulating Homomorphic Evaluation of Deep Learning Predictions
212(19)
Christina Boura
Nicolas Gama
Mariya Georgieva
Dimitar Jetchev
Everything Is in the Name -- A URL Based Approach for Phishing Detection
231(18)
Harshal Tupsamudre
Ajeei Kumar Singh
Sachin Lodha
Network Cloudification (Extended Abstract)
249(11)
Yefim Dinitz
Shlomi Dolev
Sergey Frenkel
Alex Binun
Daniel Khankin
New Goal Recognition Algorithms Using Attack Graphs
260(19)
Reulh Mirsky
Ya'ar Shalom
Ahmad Majadly
Kobi Gal
Rami Puzis
Ariel Felner
PeerClear: Peer-to-Peer Bot-net Detection
279(17)
Amit Kumar
Nilesh Kumar
Anand Handa
Sandeep Kumar Shukla
Rethinking Identification Protocols from the Point of View of the GDPR
296(20)
Mirostaw Kutylowski
Lukasz Krzywiecki
Xiaofeng Chen
Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement)
316(4)
Meir Kalech
Amit Shlomo
Robert Moskovich
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)
320(4)
Lukasz Krzywiecki
Miroslaw Kutylowski
Jakub Pezda
Marcin Slowik
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)
324(5)
Vasiliki Liagkou
Paul Spirakis
Yannis C. Stamatiou
Author Index 329