Cyber Security Cryptography and Machine Learning: 2nd International Symposium Front Cover

Cyber Security Cryptography and Machine Learning: 2nd International Symposium

  • Length: 287 pages
  • Edition: 1st ed. 2018
  • Publisher:
  • Publication Date: 2018-07-26
  • ISBN-10: 3319941461
  • ISBN-13: 9783319941462
  • Sales Rank: #1886623 (See Top 100 Books)

Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Lecture Notes in Computer Science)

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.

The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

Table of Contents

Chapter 1. Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission
Chapter 2. Efficient Construction of the Kite Generator Revisited
Chapter 3. Using Noisy Binary Search for Differentially Private Anomaly Detection
Chapter 4. Distributed Web Mining of Ethereum
Chapter 5. An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors
Chapter 6. Detecting and Coloring Anomalies in Real Cellular Network Using Principle Component Analysis
Chapter 7. Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors
Chapter 8. Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks
Chapter 9. Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation
Chapter 10. Highway State Gating for Recurrent Highway Networks: Improving Information Flow Through Time
Chapter 11. Secured Data Gathering Protocol for IoT Networks
Chapter 12. Towards Building Active Defense Systems for Software Applications
Chapter 13. Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems
Chapter 14. Brief Announcement: Image Authentication Using Hyperspectral Layers
Chapter 15. Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious Attacks
Chapter 16. Intercepting a Stealthy Network
Chapter 17. Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs
Chapter 18. Detection in the Dark – Exploiting XSS Vulnerability in C&C Panels to Detect Malwares
Chapter 19. A Planning Approach to Monitoring Computer Programs’ Behavior
Chapter 20. One-Round Secure Multiparty Computation of Arithmetic Streams and Functions
Chapter 21. Brief Announcement: Gradual Learning of Deep Recurrent Neural Network
Chapter 22. Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules
Chapter 23. Brief Announcement: Deriving Context for Touch Events

To access the link, solve the captcha.