Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cyber Security, Cryptology, and Machine Learning: 7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings

Edited by , Edited by , Edited by
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13914
  • Izdošanas datums: 20-Jun-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031346712
  • Formāts - EPUB+DRM
  • Cena: 94,58 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: EPUB+DRM
  • Sērija : Lecture Notes in Computer Science 13914
  • Izdošanas datums: 20-Jun-2023
  • Izdevniecība: Springer International Publishing AG
  • Valoda: eng
  • ISBN-13: 9783031346712

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023, held in Be'er Sheva, Israel, in June 2023.

The 21 full and 15 short papers were carefully reviewed and selected from 70 submissions. They deal with the theory, design, analysis, implementation, and application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.

Localhost Detour from Public to Private Networks.- Pseudo-Random Walk on
Ideals: Practical Speed-Up in Relation Collection for Class Group
Computation.- Efficient Extended GCD and Class Groups from Secure Integer
Arithmetic.- On Distributed Randomness Generation in Blockchains.- Efficient
Skip Connections Realization for Secure Inference on Encrypted Data.- Single
Instance Self-Masking via PermutationsA Fusion-Based Framework for
Unsupervised Single Image Super-Resolution.- Generating One-Hot Maps under
EncryptionBuilding blocks for LSTM homomorphic evaluation with
TFHE.- CANdito: Improving Payload-based Detection of Attacks on Controller
Area Networks.- Using Machine Learning Models for Earthquake Magnitude
Prediction in California, Japan and Israel.- A Bag of Tokens Neural Network
to Predict Webpage Age.- Correlations Between (Nonlinear) Combiners of Input
and Output of Random Functions and Permutations (Short Paper).- PPAuth: A
Privacy-Preserving Framework for Authentication of Digital Image.- Robust
Group Testing-Based Multiple-Access Protocol for Massive MIMO.- The use of
Performance-Counters to perform side-channel attacks.- HAMLET: A Transformer
Based Approach for Money Laundering Detection.- Hollow-Pass: A Dual-View
Pattern Password Against Shoulder-Surfing Attacks.- Practical Improvements on
BKZ Algorithm.- Enhancing Ransomware Classification with Multi-Stage Feature
Selection and Data Imbalance Correction.- Short Paper: A
Desynchronization-Based Countermeasure Against Side-Channel Analysis of
Neural Networks.- New Approach for Sine and Cosine in Secure Fixed-Point
Arithmetic.- How Hardened is Your Hardware? Guiding ChatGPT to Generate
Secure Hardware Resistant to CWEs.- Evaluating the Robustness of Automotive
Intrusion Detection Systems against Evasion Attacks.- On adaptively secure
prefix encryption under LWESigML: Supervised Log Anomaly with Fully
Homomorphic Encryption.- HBSS: (Simple) Hash-Based Stateless Signatures --
Hash all the way to the Rescue.- Improving Performance in Space-Hard
Algorithms.- A survey of security challenges in Automatic Identification
System (AIS) Protocol.- A new interpretation for the GHASH authenticator of
AES-GCM.- Fast  ORAM  with Server-aided Preprocessing and Pragmatic
Privacy-Efficiency Trade-off.- Improving Physical Layer Security of Ground
Stations Against GEO Satellite Spoofing Attacks.- Midgame Attacks and Defense
Against Them.- Deep Neural Networks for Encrypted Inference with TFHE.- On
the existence of highly organized communities in networks of locally
interacting agents.- Patch or Exploit? NVD Assisted Classification of
Vulnerability-Related Github Pages.