Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/1348
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dolev, Shlomi. ; | en_US |
dc.contributor.author | Lodha, Sachin. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:54Z | - |
dc.date.available | 2020-05-17T08:27:54Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319600802 ; | en_US |
dc.identifier.isbn | 9783319600796 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1348 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319600796. ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; | en_US |
dc.description.statementofresponsibility | edited by Shlomi Dolev, Sachin Lodha. | en_US |
dc.format.extent | XII, 307 p. 59 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; | en_US |
dc.relation.haspart | 9783319600802.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science and Mathematics | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Computer graphics. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Artificial Intell | en_US |
dc.title | Cyber Security Cryptography and Machine Learning | en_US |
dc.title.alternative | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319600802.pdf | 16.02 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dolev, Shlomi. ; | en_US |
dc.contributor.author | Lodha, Sachin. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:54Z | - |
dc.date.available | 2020-05-17T08:27:54Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319600802 ; | en_US |
dc.identifier.isbn | 9783319600796 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1348 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319600796. ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; | en_US |
dc.description.statementofresponsibility | edited by Shlomi Dolev, Sachin Lodha. | en_US |
dc.format.extent | XII, 307 p. 59 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; | en_US |
dc.relation.haspart | 9783319600802.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science and Mathematics | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Computer graphics. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Artificial Intell | en_US |
dc.title | Cyber Security Cryptography and Machine Learning | en_US |
dc.title.alternative | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319600802.pdf | 16.02 MB | Adobe PDF | Preview File |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Dolev, Shlomi. ; | en_US |
dc.contributor.author | Lodha, Sachin. ; | en_US |
dc.date.accessioned | 2013 | en_US |
dc.date.accessioned | 2020-05-17T08:27:54Z | - |
dc.date.available | 2020-05-17T08:27:54Z | - |
dc.date.issued | 2017 | en_US |
dc.identifier.isbn | 9783319600802 ; | en_US |
dc.identifier.isbn | 9783319600796 (print) ; | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/1348 | - |
dc.description | QA76.9.A25 ; | en_US |
dc.description | Printed edition: ; 9783319600796. ; | en_US |
dc.description | 005.8 ; 23 ; | en_US |
dc.description | SpringerLink (Online service) ; | en_US |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. ; | en_US |
dc.description.statementofresponsibility | edited by Shlomi Dolev, Sachin Lodha. | en_US |
dc.format.extent | XII, 307 p. 59 illus. ; online resource. ; | en_US |
dc.publisher | Springer International Publishing : | en_US |
dc.publisher | Imprint: Springer, | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; | en_US |
dc.relation.ispartofseries | Lecture Notes in Computer Science, ; 0302-9743 ; ; 10332. ; | en_US |
dc.relation.haspart | 9783319600802.pdf | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Computer Security | en_US |
dc.subject | Data encryption (Computer science). ; | en_US |
dc.subject | Computer Science and Mathematics | en_US |
dc.subject | Artificial Intelligence | en_US |
dc.subject | Computer graphics. ; | en_US |
dc.subject | Computer Science | en_US |
dc.subject | Systems and Data Security | en_US |
dc.subject | Data Encryption. ; | en_US |
dc.subject | Artificial Intell | en_US |
dc.title | Cyber Security Cryptography and Machine Learning | en_US |
dc.title.alternative | First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / | en_US |
dc.type | Book | en_US |
dc.publisher.place | Cham : | en_US |
Appears in Collections: | مهندسی فناوری اطلاعات |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
9783319600802.pdf | 16.02 MB | Adobe PDF | Preview File |