|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996466288903316 |
|
|
Titolo |
Cyber Security Cryptography and Machine Learning [[electronic resource] ] : First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings / / edited by Shlomi Dolev, Sachin Lodha |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2017.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XII, 307 p. 59 illus.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology ; ; 10332 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Data encryption (Computer science) |
Artificial intelligence |
Optical data processing |
Computer science—Mathematics |
Data protection |
Systems and Data Security |
Cryptology |
Artificial Intelligence |
Computer Imaging, Vision, Pattern Recognition and Graphics |
Discrete Mathematics in Computer Science |
Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic |
|
|
|
|
|
|
|
|
|
|
recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. |
|
|
|
|
|
| |