Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1348
Title: Cyber Security Cryptography and Machine Learning
Other Titles: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /
Authors: Dolev, Shlomi. ;;Lodha, Sachin. ;
subject: Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell
Year: 2017
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;
Abstract: This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ;
Description: QA76.9.A25 ;
Printed edition: ; 9783319600796. ;
005.8 ; 23 ;
SpringerLink (Online service) ;




URI: http://localhost/handle/Hannan/1348
ISBN: 9783319600802 ;
9783319600796 (print) ;
More Information: XII, 307 p. 59 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319600802.pdf16.02 MBAdobe PDFThumbnail
Preview File
Title: Cyber Security Cryptography and Machine Learning
Other Titles: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /
Authors: Dolev, Shlomi. ;;Lodha, Sachin. ;
subject: Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell
Year: 2017
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;
Abstract: This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ;
Description: QA76.9.A25 ;
Printed edition: ; 9783319600796. ;
005.8 ; 23 ;
SpringerLink (Online service) ;




URI: http://localhost/handle/Hannan/1348
ISBN: 9783319600802 ;
9783319600796 (print) ;
More Information: XII, 307 p. 59 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319600802.pdf16.02 MBAdobe PDFThumbnail
Preview File
Title: Cyber Security Cryptography and Machine Learning
Other Titles: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /
Authors: Dolev, Shlomi. ;;Lodha, Sachin. ;
subject: Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell
Year: 2017
place: Cham :
Publisher: Springer International Publishing :
Imprint: Springer,
Series/Report no.: Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;
Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ;
Abstract: This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ;
Description: QA76.9.A25 ;
Printed edition: ; 9783319600796. ;
005.8 ; 23 ;
SpringerLink (Online service) ;




URI: http://localhost/handle/Hannan/1348
ISBN: 9783319600802 ;
9783319600796 (print) ;
More Information: XII, 307 p. 59 illus. ; online resource. ;
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319600802.pdf16.02 MBAdobe PDFThumbnail
Preview File