LEADER 03843nam 22007455 450 001 9910484135603321 005 20251113193537.0 010 $a3-319-60080-X 024 7 $a10.1007/978-3-319-60080-2 035 $a(CKB)4340000000061574 035 $a(DE-He213)978-3-319-60080-2 035 $a(MiAaPQ)EBC5591773 035 $a(PPN)202990826 035 $a(EXLCZ)994340000000061574 100 $a20170601d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Cryptography and Machine Learning $eFirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /$fedited by Shlomi Dolev, Sachin Lodha 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XII, 307 p. 59 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v10332 311 08$a3-319-60079-6 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v10332 606 $aData protection 606 $aCryptography 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aImage processing$xDigital techniques 606 $aComputer vision 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aData and Information Security 606 $aCryptology 606 $aArtificial Intelligence 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics 606 $aDiscrete Mathematics in Computer Science 615 0$aData protection. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 0$aImage processing$xDigital techniques. 615 0$aComputer vision. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 14$aData and Information Security. 615 24$aCryptology. 615 24$aArtificial Intelligence. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aDiscrete Mathematics in Computer Science. 676 $a005.824 702 $aDolev$b Shlomi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLodha$b Sachin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484135603321 996 $aCyber Security Cryptography and Machine Learning$92200042 997 $aUNINA