Cyber Security Cryptography and Machine Learning -

Cyber Security Cryptography and Machine Learning

First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings

Shlomi Dolev, Sachin Lodha (Herausgeber)

Buch | Softcover
XII, 307 Seiten
2017 | 1st ed. 2017
Springer International Publishing (Verlag)
978-3-319-60079-6 (ISBN)
69,54 inkl. MwSt

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.

The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction;  secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.

lt;p>Cyber security.-Secure software development methodologies, formal methods semantics and verification of secure systems.-Fault tolerance, reliability, availability of distributed secure systems.- Game-theoretic approaches to secure computing.- Automatic recovery of self-stabilizing and self-organizing systems.- Communication, authentication and identification security.- Cyber security for mobile and Internet of things.- Cyber security of corporations.- Security and privacy for cloud, edge and fog computing.-Ccryptography.- Cryptographic implementation analysis and construction.-  Secure multi-party computation.- Privacy-enhancing technologies and anonymity.- Post-quantum cryptography and security.- Machine learning and big data.- Anomaly detection and malware identification.- Business intelligence and security.- Digital forensics.- Digital rights management; trust management and reputation systems.- Information retrieval, risk analysis, DoS.>

Erscheinungsdatum
Reihe/Serie Lecture Notes in Computer Science
Security and Cryptology
Zusatzinfo XII, 307 p. 59 illus.
Verlagsort Cham
Sprache englisch
Maße 155 x 235 mm
Gewicht 492 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Schlagworte algorithms • Applications • Artificial Intelligence • artificial intelligence (incl. robotics) • authentication • classification • computer crime • Computer Imaging, Vision, Pattern Recognition and • computer operating systems • computer programming languages • Computer Science • Computer Security • computer vision • conference proceedings • cybersecurity • data encryption • data privacy • Data Security • Discrete Mathematics • Discrete mathematics in computer science • Encryption • face recognition • Image Processing • Informatics • Internet • machine learning • malwares • Maths for computer scientists • Network Security • privacy • Research • Robotics • security • Signal Processing • Support Vector Machines (SVM) • systems and data security
ISBN-10 3-319-60079-6 / 3319600796
ISBN-13 978-3-319-60079-6 / 9783319600796
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99