Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1348
| Title: | Cyber Security Cryptography and Machine Learning |
| Other Titles: | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / |
| Authors: | Dolev, Shlomi. ;;Lodha, Sachin. ; |
| subject: | Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell |
| Year: | 2017 |
| place: | Cham : |
| Publisher: | Springer International Publishing : Imprint: Springer, |
| Series/Report no.: | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; |
| Abstract: | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; |
| Description: | QA76.9.A25 ; Printed edition: ; 9783319600796. ; 005.8 ; 23 ; SpringerLink (Online service) ; |
| URI: | http://localhost/handle/Hannan/1348 |
| ISBN: | 9783319600802 ; 9783319600796 (print) ; |
| More Information: | XII, 307 p. 59 illus. ; online resource. ; |
| Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 9783319600802.pdf | 16.02 MB | Adobe PDF | ![]() Preview File |
| Title: | Cyber Security Cryptography and Machine Learning |
| Other Titles: | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / |
| Authors: | Dolev, Shlomi. ;;Lodha, Sachin. ; |
| subject: | Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell |
| Year: | 2017 |
| place: | Cham : |
| Publisher: | Springer International Publishing : Imprint: Springer, |
| Series/Report no.: | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; |
| Abstract: | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; |
| Description: | QA76.9.A25 ; Printed edition: ; 9783319600796. ; 005.8 ; 23 ; SpringerLink (Online service) ; |
| URI: | http://localhost/handle/Hannan/1348 |
| ISBN: | 9783319600802 ; 9783319600796 (print) ; |
| More Information: | XII, 307 p. 59 illus. ; online resource. ; |
| Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 9783319600802.pdf | 16.02 MB | Adobe PDF | ![]() Preview File |
| Title: | Cyber Security Cryptography and Machine Learning |
| Other Titles: | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / |
| Authors: | Dolev, Shlomi. ;;Lodha, Sachin. ; |
| subject: | Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell |
| Year: | 2017 |
| place: | Cham : |
| Publisher: | Springer International Publishing : Imprint: Springer, |
| Series/Report no.: | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; |
| Abstract: | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; |
| Description: | QA76.9.A25 ; Printed edition: ; 9783319600796. ; 005.8 ; 23 ; SpringerLink (Online service) ; |
| URI: | http://localhost/handle/Hannan/1348 |
| ISBN: | 9783319600802 ; 9783319600796 (print) ; |
| More Information: | XII, 307 p. 59 illus. ; online resource. ; |
| Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
| File | Description | Size | Format | |
|---|---|---|---|---|
| 9783319600802.pdf | 16.02 MB | Adobe PDF | ![]() Preview File |
