Cyber Security, Cryptology, and Machine Learning (eBook, PDF)
7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings
Redaktion: Dolev, Shlomi; Paillier, Pascal; Gudes, Ehud
73,95 €
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
37 °P sammeln
73,95 €
Als Download kaufen
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
37 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
73,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
37 °P sammeln
Cyber Security, Cryptology, and Machine Learning (eBook, PDF)
7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29-30, 2023, Proceedings
Redaktion: Dolev, Shlomi; Paillier, Pascal; Gudes, Ehud
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023, held in Be'er Sheva, Israel, in June 2023.
The 21 full and 15 short papers were carefully reviewed and selected from 70 submissions. They deal with the theory, design, analysis, implementation, and application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 25.09MB
Andere Kunden interessierten sich auch für
- Cyber Security, Cryptology, and Machine Learning (eBook, PDF)73,95 €
- Cyber Security, Cryptology, and Machine Learning (eBook, PDF)53,95 €
- Innovative Security Solutions for Information Technology and Communications (eBook, PDF)40,95 €
- Secure IT Systems (eBook, PDF)61,95 €
- Advances in Artificial Intelligence and Security (eBook, PDF)97,95 €
- Cyberspace Safety and Security (eBook, PDF)53,95 €
- Critical Information Infrastructures Security (eBook, PDF)48,95 €
-
-
-
This book constitutes the refereed proceedings of the 7th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2023, held in Be'er Sheva, Israel, in June 2023.
The 21 full and 15 short papers were carefully reviewed and selected from 70 submissions. They deal with the theory, design, analysis, implementation, and application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
The 21 full and 15 short papers were carefully reviewed and selected from 70 submissions. They deal with the theory, design, analysis, implementation, and application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in these research areas.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer International Publishing
- Seitenzahl: 524
- Erscheinungstermin: 20. Juni 2023
- Englisch
- ISBN-13: 9783031346712
- Artikelnr.: 68295713
- Verlag: Springer International Publishing
- Seitenzahl: 524
- Erscheinungstermin: 20. Juni 2023
- Englisch
- ISBN-13: 9783031346712
- Artikelnr.: 68295713
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Localhost Detour from Public to Private Networks.- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation.- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic.- On Distributed Randomness Generation in Blockchains.- Efficient Skip Connections Realization for Secure Inference on Encrypted Data.- Single Instance Self-Masking via PermutationsA Fusion-Based Framework for Unsupervised Single Image Super-Resolution.- Generating One-Hot Maps under EncryptionBuilding blocks for LSTM homomorphic evaluation with TFHE.- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks.- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel.- A Bag of Tokens Neural Network to Predict Webpage Age.- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper).- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image.- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO.- The use of Performance-Counters to perform side-channel attacks.- HAMLET: A Transformer Based Approach for Money Laundering Detection.- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks.- Practical Improvements on BKZ Algorithm.- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction.- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic.- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs.- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks.- On adaptively secure prefix encryption under LWESigML: Supervised Log Anomaly with Fully Homomorphic Encryption.- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue.- Improving Performance in Space-Hard Algorithms.- A survey of security challenges in Automatic Identification System (AIS) Protocol.- A new interpretation for the GHASH authenticator of AES-GCM.- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off.- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks.- Midgame Attacks and Defense Against Them.- Deep Neural Networks for Encrypted Inference with TFHE.- On the existence of highly organized communities in networks of locally interacting agents.- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages.
Localhost Detour from Public to Private Networks.- Pseudo-Random Walk on Ideals: Practical Speed-Up in Relation Collection for Class Group Computation.- Efficient Extended GCD and Class Groups from Secure Integer Arithmetic.- On Distributed Randomness Generation in Blockchains.- Efficient Skip Connections Realization for Secure Inference on Encrypted Data.- Single Instance Self-Masking via PermutationsA Fusion-Based Framework for Unsupervised Single Image Super-Resolution.- Generating One-Hot Maps under EncryptionBuilding blocks for LSTM homomorphic evaluation with TFHE.- CANdito: Improving Payload-based Detection of Attacks on Controller Area Networks.- Using Machine Learning Models for Earthquake Magnitude Prediction in California, Japan and Israel.- A Bag of Tokens Neural Network to Predict Webpage Age.- Correlations Between (Nonlinear) Combiners of Input and Output of Random Functions and Permutations (Short Paper).- PPAuth: A Privacy-Preserving Framework for Authentication of Digital Image.- Robust Group Testing-Based Multiple-Access Protocol for Massive MIMO.- The use of Performance-Counters to perform side-channel attacks.- HAMLET: A Transformer Based Approach for Money Laundering Detection.- Hollow-Pass: A Dual-View Pattern Password Against Shoulder-Surfing Attacks.- Practical Improvements on BKZ Algorithm.- Enhancing Ransomware Classification with Multi-Stage Feature Selection and Data Imbalance Correction.- Short Paper: A Desynchronization-Based Countermeasure Against Side-Channel Analysis of Neural Networks.- New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic.- How Hardened is Your Hardware? Guiding ChatGPT to Generate Secure Hardware Resistant to CWEs.- Evaluating the Robustness of Automotive Intrusion Detection Systems against Evasion Attacks.- On adaptively secure prefix encryption under LWESigML: Supervised Log Anomaly with Fully Homomorphic Encryption.- HBSS: (Simple) Hash-Based Stateless Signatures -- Hash all the way to the Rescue.- Improving Performance in Space-Hard Algorithms.- A survey of security challenges in Automatic Identification System (AIS) Protocol.- A new interpretation for the GHASH authenticator of AES-GCM.- Fast ORAM with Server-aided Preprocessing and Pragmatic Privacy-Efficiency Trade-off.- Improving Physical Layer Security of Ground Stations Against GEO Satellite Spoofing Attacks.- Midgame Attacks and Defense Against Them.- Deep Neural Networks for Encrypted Inference with TFHE.- On the existence of highly organized communities in networks of locally interacting agents.- Patch or Exploit? NVD Assisted Classification of Vulnerability-Related Github Pages.