04189nam 22007215 450 99646628890331620210804103706.03-319-60080-X10.1007/978-3-319-60080-2(CKB)4340000000061574(DE-He213)978-3-319-60080-2(MiAaPQ)EBC5591773(PPN)202990826(EXLCZ)99434000000006157420170601d2017 u| 0engurnn#008mamaatxtrdacontentcrdamediacrrdacarrierCyber Security Cryptography and Machine Learning[electronic resource] First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /edited by Shlomi Dolev, Sachin Lodha1st ed. 2017.Cham :Springer International Publishing :Imprint: Springer,2017.1 online resource (XII, 307 p. 59 illus.)Security and Cryptology ;103323-319-60079-6 Includes bibliographical references and index.This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.Security and Cryptology ;10332Computer securityData encryption (Computer science)Artificial intelligenceOptical data processingComputer science—MathematicsData protectionSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Computer Imaging, Vision, Pattern Recognition and Graphicshttps://scigraph.springernature.com/ontologies/product-market-codes/I22005Discrete Mathematics in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17028Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Computer security.Data encryption (Computer science).Artificial intelligence.Optical data processing.Computer science—Mathematics.Data protection.Systems and Data Security.Cryptology.Artificial Intelligence.Computer Imaging, Vision, Pattern Recognition and Graphics.Discrete Mathematics in Computer Science.Security.005.824Dolev Shlomiedthttp://id.loc.gov/vocabulary/relators/edtLodha Sachinedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466288903316Cyber Security Cryptography and Machine Learning2200042UNISA