Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings

Shlomi Dolev (Editor), Sachin Lodha (Editor)

Research output: Book/ReportBookpeer-review

Abstract

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.
Original languageEnglish
Place of PublicationCham
PublisherSpringer International Publishing; Imprint: Springer
Number of pages307
Volume10332
Edition1st ed. 2017
ISBN (Electronic)331960080X
ISBN (Print)978-3-319-60079-6
DOIs
StatePublished - 2017

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Keywords

  • algorithms
  • authentication
  • classification
  • computer crime
  • computer operating systems
  • computer programming languages
  • cybersecurity
  • data privacy
  • data security
  • encryption
  • face recognition
  • image processing
  • Internet
  • machine learning
  • malwares
  • network security
  • privacy
  • security
  • signal processing
  • Support Vector Machines (SVM)

Fingerprint

Dive into the research topics of 'Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings'. Together they form a unique fingerprint.

Cite this