𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cyber Security Cryptography and Machine Learning

✍ Scribed by Itai Dinur, Shlomi Dolev, Sachin Lodha


Publisher
Springer International Publishing
Year
2018
Tongue
English
Leaves
298
Series
Lecture Notes in Computer Science 10879
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.

The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.

✦ Table of Contents


Front Matter ....Pages I-XII
Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission (Tomer Yeminy, Eyal Wohlgemuth, Dan Sadot, Zeev Zalevsky)....Pages 1-5
Efficient Construction of the Kite Generator Revisited (Orr Dunkelman, Ariel Weizman)....Pages 6-19
Using Noisy Binary Search for Differentially Private Anomaly Detection (Daniel M. Bittner, Anand D. Sarwate, Rebecca N. Wright)....Pages 20-37
Distributed Web Mining of Ethereum (Trishita Tiwari, David Starobinski, Ari Trachtenberg)....Pages 38-54
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors (Ehud Gudes, Nadav Voloch)....Pages 55-67
Detecting and Coloring Anomalies in Real Cellular Network Using Principle Component Analysis (Yoram Segal, Dan Vilenchik, Ofer Hadar)....Pages 68-83
Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors (Shlomi Dolev, Chryssis Georgiou, Ioannis Marcoullis, Elad M. Schiller)....Pages 84-100
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (Ioannis Chatzigiannakis, Vasiliki Liagkou, Paul G. Spirakis)....Pages 101-104
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation (Philip Derbeko, Shlomi Dolev, Ehud Gudes)....Pages 105-119
Highway State Gating for Recurrent Highway Networks: Improving Information Flow Through Time (Ron Shoham, Haim Permuter)....Pages 120-128
Secured Data Gathering Protocol for IoT Networks (Alejandro Cohen, Asaf Cohen, Omer Gurewitz)....Pages 129-143
Towards Building Active Defense Systems for Software Applications (Zara Perumal, Kalyan Veeramachaneni)....Pages 144-161
Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems (Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint)....Pages 162-180
Brief Announcement: Image Authentication Using Hyperspectral Layers (Guy Leshem, Menachem Domb)....Pages 181-183
Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious Attacks (Sergey Frenkel, Victor Zakharov)....Pages 184-187
Intercepting a Stealthy Network (Mai Ben Adar Bessos, Amir Herzberg)....Pages 188-205
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs (Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez, Moti Yung)....Pages 206-226
Detection in the Dark – Exploiting XSS Vulnerability in C&C Panels to Detect Malwares (Shay Nachum, Assaf Schuster, Opher Etzion)....Pages 227-242
A Planning Approach to Monitoring Computer Programs’ Behavior (Alexandre Cukier, Ronen I. Brafman, Yotam Perkal, David Tolpin)....Pages 243-254
One-Round Secure Multiparty Computation of Arithmetic Streams and Functions (Dor Bitan, Shlomi Dolev)....Pages 255-273
Brief Announcement: Gradual Learning of Deep Recurrent Neural Network (Ziv Aharoni, Gal Rattner, Haim Permuter)....Pages 274-277
Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules (Oded Margalit)....Pages 278-282
Brief Announcement: Deriving Context for Touch Events (Moran Azran, Niv Ben Shabat, Tal Shkolnik, Yossi Oren)....Pages 283-286
Back Matter ....Pages 287-287

✦ Subjects


Computer Science; Systems and Data Security; Operating Systems; Information Systems Applications (incl.Internet); Data Mining and Knowledge Discovery; Computers and Society; Computer Communication Networks


πŸ“œ SIMILAR VOLUMES


Cyber Security Meets Machine Learning
✍ Xiaofeng Chen, Willy Susilo, Elisa Bertino πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial i

Machine Learning for Cyber Security
✍ Preeti Malik, Lata Nautiyal, Mangey Ram πŸ“‚ Library πŸ“… 2022 πŸ› De Gruyter 🌐 English

<p><span>Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical model

Machine Learning for Cyber Security
πŸ“‚ Library πŸ“… 2023 πŸ› Springer International Publishing 🌐 English

<div>The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed</div><div>proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.</div><div></div><div>The 100

Machine Learning for Cyber Security
πŸ“‚ Library πŸ“… 2023 πŸ› Springer International Publishing 🌐 English

The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed<div>proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.</div><div> </div><div>The 100 full pape

Machine Learning for Cyber Security
✍ Preeti Malik (editor); Lata Nautiyal (editor); Mangey Ram (editor) πŸ“‚ Library πŸ“… 2022 πŸ› De Gruyter 🌐 English

<p>This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses

Game Theory and Machine Learning for Cyb
✍ Charles A. Kamhoua (editor), Christopher D. Kiekintveld (editor), Fei Fang (edit πŸ“‚ Library πŸ“… 2021 πŸ› Wiley-IEEE Press 🌐 English

<p><b>Move beyond the foundations of machine learning and game theory in cyber security to the latest researchΒ in this cutting-edge fieldΒ </b></p> <p>InΒ <i>Game Theory and Machine Learning for Cyber Security</i>,Β a team of expert security researchers delivers aΒ collection of central research contrib