Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1348
Title: | Cyber Security Cryptography and Machine Learning |
Other Titles: | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / |
Authors: | Dolev, Shlomi. ;;Lodha, Sachin. ; |
subject: | Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell |
Year: | 2017 |
place: | Cham : |
Publisher: | Springer International Publishing : Imprint: Springer, |
Series/Report no.: | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; |
Abstract: | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; |
Description: | QA76.9.A25 ; Printed edition: ; 9783319600796. ; 005.8 ; 23 ; SpringerLink (Online service) ; |
URI: | http://localhost/handle/Hannan/1348 |
ISBN: | 9783319600802 ; 9783319600796 (print) ; |
More Information: | XII, 307 p. 59 illus. ; online resource. ; |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319600802.pdf | 16.02 MB | Adobe PDF | Preview File |
Title: | Cyber Security Cryptography and Machine Learning |
Other Titles: | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / |
Authors: | Dolev, Shlomi. ;;Lodha, Sachin. ; |
subject: | Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell |
Year: | 2017 |
place: | Cham : |
Publisher: | Springer International Publishing : Imprint: Springer, |
Series/Report no.: | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; |
Abstract: | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; |
Description: | QA76.9.A25 ; Printed edition: ; 9783319600796. ; 005.8 ; 23 ; SpringerLink (Online service) ; |
URI: | http://localhost/handle/Hannan/1348 |
ISBN: | 9783319600802 ; 9783319600796 (print) ; |
More Information: | XII, 307 p. 59 illus. ; online resource. ; |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319600802.pdf | 16.02 MB | Adobe PDF | Preview File |
Title: | Cyber Security Cryptography and Machine Learning |
Other Titles: | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / |
Authors: | Dolev, Shlomi. ;;Lodha, Sachin. ; |
subject: | Computer Science;Computer Security;Data encryption (Computer science). ;;Computer Science and Mathematics;Artificial Intelligence;Computer graphics. ;;Computer Science;Systems and Data Security;Data Encryption. ;;Artificial Intell |
Year: | 2017 |
place: | Cham : |
Publisher: | Springer International Publishing : Imprint: Springer, |
Series/Report no.: | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; |
Abstract: | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; |
Description: | QA76.9.A25 ; Printed edition: ; 9783319600796. ; 005.8 ; 23 ; SpringerLink (Online service) ; |
URI: | http://localhost/handle/Hannan/1348 |
ISBN: | 9783319600802 ; 9783319600796 (print) ; |
More Information: | XII, 307 p. 59 illus. ; online resource. ; |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319600802.pdf | 16.02 MB | Adobe PDF | Preview File |