LEADER 04189nam 22007215 450 001 996466288903316 005 20210804103706.0 010 $a3-319-60080-X 024 7 $a10.1007/978-3-319-60080-2 035 $a(CKB)4340000000061574 035 $a(DE-He213)978-3-319-60080-2 035 $a(MiAaPQ)EBC5591773 035 $a(PPN)202990826 035 $a(EXLCZ)994340000000061574 100 $a20170601d2017 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber Security Cryptography and Machine Learning$b[electronic resource] $eFirst International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings /$fedited by Shlomi Dolev, Sachin Lodha 205 $a1st ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XII, 307 p. 59 illus.) 225 1 $aSecurity and Cryptology ;$v10332 311 $a3-319-60079-6 320 $aIncludes bibliographical references and index. 330 $aThis book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS. 410 0$aSecurity and Cryptology ;$v10332 606 $aComputer security 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aOptical data processing 606 $aComputer science?Mathematics 606 $aData protection 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aArtificial Intelligence$3https://scigraph.springernature.com/ontologies/product-market-codes/I21000 606 $aComputer Imaging, Vision, Pattern Recognition and Graphics$3https://scigraph.springernature.com/ontologies/product-market-codes/I22005 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aSecurity$3https://scigraph.springernature.com/ontologies/product-market-codes/I28000 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aArtificial intelligence. 615 0$aOptical data processing. 615 0$aComputer science?Mathematics. 615 0$aData protection. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aArtificial Intelligence. 615 24$aComputer Imaging, Vision, Pattern Recognition and Graphics. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSecurity. 676 $a005.824 702 $aDolev$b Shlomi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLodha$b Sachin$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466288903316 996 $aCyber Security Cryptography and Machine Learning$92200042 997 $aUNISA