Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings

Shlomi Dolev (Editor), Sachin Lodha (Editor)

Research output: Book/ReportBookpeer-review

Abstract

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017. The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction; secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.
Original languageEnglish
PublisherSpringer Cham
Number of pages307
ISBN (Electronic)9783319600802
ISBN (Print)9783319600796
DOIs
StatePublished - Jun 2017

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume10332
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Keywords

  • algorithms
  • authentication
  • classification
  • computer crime
  • computer operating systems
  • computer programming languages
  • cybersecurity
  • data privacy
  • data security
  • encryption
  • face recognition
  • image processing
  • Internet
  • machine learning
  • malwares
  • network security
  • privacy
  • security
  • signal processing
  • Support Vector Machines (SVM)

Fingerprint

Dive into the research topics of 'Cyber Security Cryptography and Machine Learning: First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings'. Together they form a unique fingerprint.

Cite this