| TÃtulo : |
Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings |
| Tipo de documento: |
documento electrónico |
| Autores: |
Dinur, Itai, ; Dolev, Shlomi, ; Lodha, Sachin, |
| Mención de edición: |
1 ed. |
| Editorial: |
[s.l.] : Springer |
| Fecha de publicación: |
2018 |
| Número de páginas: |
XII, 287 p. 86 ilustraciones |
| ISBN/ISSN/DL: |
978-3-319-94147-9 |
| Nota general: |
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. |
| Palabras clave: |
Protección de datos Sistemas operativos (computadoras) Software de la aplicacion Procesamiento de datos Computadoras y civilización Red de computadoras Seguridad de datos e información Sistemas operativos Aplicaciones informáticas y de sistemas de información MinerÃa de datos y descubrimiento de conocimientos Computadoras y sociedad Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas del Segundo Simposio Internacional sobre CriptografÃa de Seguridad Cibernética y Aprendizaje Automático, CSCML 2018, celebrado en Beer-Sheva, Israel, en junio de 2018. Los 16 artÃculos completos y 6 artÃculos breves presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados. de 44 presentaciones. Se ocupan de la teorÃa, diseño, análisis, implementación o aplicación de sistemas y redes de ciberseguridad, criptografÃa y aprendizaje automático, y temas conceptualmente innovadores en su ámbito. |
| Nota de contenido: |
Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings [documento electrónico] / Dinur, Itai, ; Dolev, Shlomi, ; Lodha, Sachin, . - 1 ed. . - [s.l.] : Springer, 2018 . - XII, 287 p. 86 ilustraciones. ISBN : 978-3-319-94147-9 Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
| Palabras clave: |
Protección de datos Sistemas operativos (computadoras) Software de la aplicacion Procesamiento de datos Computadoras y civilización Red de computadoras Seguridad de datos e información Sistemas operativos Aplicaciones informáticas y de sistemas de información MinerÃa de datos y descubrimiento de conocimientos Computadoras y sociedad Redes de comunicación informática |
| Ãndice Dewey: |
005.8 Ciencia de los computadores (Programación, programas de sistemas) |
| Resumen: |
Este libro constituye las actas arbitradas del Segundo Simposio Internacional sobre CriptografÃa de Seguridad Cibernética y Aprendizaje Automático, CSCML 2018, celebrado en Beer-Sheva, Israel, en junio de 2018. Los 16 artÃculos completos y 6 artÃculos breves presentados en este volumen fueron cuidadosamente revisados ​​y seleccionados. de 44 presentaciones. Se ocupan de la teorÃa, diseño, análisis, implementación o aplicación de sistemas y redes de ciberseguridad, criptografÃa y aprendizaje automático, y temas conceptualmente innovadores en su ámbito. |
| Nota de contenido: |
Invited Paper - Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission -- Efficient Construction of the Kite Generator Revisited -- Using Noisy Binary Search for Differentially Private Anomaly Detection -- Distributed Web Mining of Ethereum -- An Information-Flow Control model for Online Social Networks based on user-attribute credibility and connection-strength factors. -Detecting and Coloring Anomalies in real cellular network using Principle Component Analysis -- Self-Stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors -- Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks (LPWANs -- Privacy Via Maintaining Small Similitude Data for Big Data Statistical Representation -- Highway State Gating for Recurrent Highway Networks: Improving information flow through time -- Secured Data Gathering Protocol for IoT Networks -- Towards building active application defense systems -- Secure Non-Interactive User Re-Enrollment in Biometrics-based Identification and Authentication Systems -- Brief Announcement: Image authentication using Hyperspectral layers -- Brief Announcement: Graph-based and Probabilistic Discrete Models Used in Detection of Malicious Attacks -- Intercepting a Stealthy Network -- Privacy in E-Shopping Transactions: Exploring and Addressing the Trade-Offs -- Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels as a New Technique to Detect Malwares -- A Planning Approach to Monitoring Computer Programs' Behavior -- Brief Announcement: Gradual Learning of Deep Recurrent Neural Network -- Brief Announcement: Adversarial Evasion of Western Electric Rules -- Brief Announcement: Deriving Context for Touch Events. |
| En lÃnea: |
https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] |
| Link: |
https://biblioteca.umanizales.edu.co/ils/opac_css/index.php?lvl=notice_display&i |
|  |