default search action
2nd CSCML 2018: Beer-Sheva, Israel
- Itai Dinur, Shlomi Dolev, Sachin Lodha:
Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings. Lecture Notes in Computer Science 10879, Springer 2018, ISBN 978-3-319-94146-2 - Tomer Yeminy, Eyal Wohlgemuth, Dan Sadot, Zeev Zalevsky:
Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission - Invited Paper. 1-5 - Orr Dunkelman, Ariel Weizman:
Efficient Construction of the Kite Generator Revisited. 6-19 - Daniel M. Bittner, Anand D. Sarwate, Rebecca N. Wright:
Using Noisy Binary Search for Differentially Private Anomaly Detection. 20-37 - Trishita Tiwari, David Starobinski, Ari Trachtenberg:
Distributed Web Mining of Ethereum. 38-54 - Ehud Gudes, Nadav Voloch:
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors. 55-67 - Yoram Segal, Dan Vilenchik, Ofer Hadar:
Detecting and Coloring Anomalies in Real Cellular Network Using Principle Component Analysis. 68-83 - Shlomi Dolev, Chryssis Georgiou, Ioannis Marcoullis, Elad Michael Schiller:
Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors. 84-100 - Ioannis Chatzigiannakis, Vasiliki Liagkou, Paul G. Spirakis:
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks. 101-104 - Philip Derbeko, Shlomi Dolev, Ehud Gudes:
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation. 105-119 - Ron Shoham, Haim H. Permuter:
Highway State Gating for Recurrent Highway Networks: Improving Information Flow Through Time. 120-128 - Alejandro Cohen, Asaf Cohen, Omer Gurewitz:
Secured Data Gathering Protocol for IoT Networks. 129-143 - Zara Perumal, Kalyan Veeramachaneni:
Towards Building Active Defense Systems for Software Applications. 144-161 - Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint:
Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems. 162-180 - Guy Leshem, Menachem Domb:
Brief Announcement: Image Authentication Using Hyperspectral Layers. 181-183 - Sergey Frenkel, Victor N. Zakharov:
Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious Attacks. 184-187 - Mai Ben-Adar Bessos, Amir Herzberg:
Intercepting a Stealthy Network. 188-205 - Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez, Moti Yung:
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs. 206-226 - Shay Nachum, Assaf Schuster, Opher Etzion:
Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares. 227-242 - Alexandre Cukier, Ronen I. Brafman, Yotam Perkal, David Tolpin:
A Planning Approach to Monitoring Computer Programs' Behavior. 243-254 - Dor Bitan, Shlomi Dolev:
One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract). 255-273 - Ziv Aharoni, Gal Rattner, Haim H. Permuter:
Brief Announcement: Gradual Learning of Deep Recurrent Neural Network. 274-277 - Oded Margalit:
Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules. 278-282 - Moran Azran, Niv Ben Shabat, Tal Shkolnik, Yossi Oren:
Brief Announcement: Deriving Context for Touch Events. 283-286
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.