


default search action
3rd CSCML 2019: Beer-Sheva, Israel
- Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung:

Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings. Lecture Notes in Computer Science 11527, Springer 2019, ISBN 978-3-030-20950-6 - Ori Shmuel, Asaf Cohen, Omer Gurewitz:

Jamming Strategies in Covert Communication. 1-15 - Tomer Ashur

, Orr Dunkelman
, Nael Masalha:
Linear Cryptanalysis Reduced Round of Piccolo-80. 16-32 - Nir Drucker

, Shay Gueron:
Continuous Key Agreement with Reduced Bandwidth. 33-46 - Yoram Segal, Ofer Hadar

:
Covert Channel Cyber-Attack over Video Stream DCT Payload - (Copyright Protection Algorithm for Video and Audio Streams). 47-66 - Shlomi Arnon

, Judy Kupferman:
Effects of Weather on Drone to IoT QKD. 67-74 - Ajay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla:

Malware Classification Using Image Representation. 75-92 - Philip Derbeko, Shlomi Dolev, Ehud Gudes:

MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement). 93-96 - Elisabeth Drayer, Tirza Routtenberg:

Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement). 97-100 - Shlomi Dolev, Yuval Poleg:

Beyond Replications in Blockchain - On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement). 101-105 - Alexander Binun, Shlomi Dolev, Tal Hadad:

Self-stabilizing Byzantine Consensus for Blockchain - (Brief Announcement). 106-110 - Shoni Gilboa, Shay Gueron:

The Advantage of Truncated Permutations. 111-120 - Luca Borzacchiello, Emilio Coppa

, Daniele Cono D'Elia
, Camil Demetrescu:
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. 121-140 - Nir Drucker

, Shay Gueron:
Generating a Random String with a Fixed Weight. 141-155 - Nadav Voloch

, Priel Levy, Mor Elmakies, Ehud Gudes:
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility. 156-168 - Kevin Alex Zhang, Kalyan Veeramachaneni:

Enhancing Image Steganalysis with Adversarially Generated Examples. 169-177 - Rami Puzis

, Guy Barshap, Polina Zilberman, Oded Leiba:
Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities. 178-197 - Itai Dinur, Natan Elul:

A Relay Attack on a Tamper Detection System (Brief Announcement). 198-201 - Ron Shoham, Haim H. Permuter:

Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement). 202-207 - Sima Nadler, Orna Raz, Marcel Zalmanovici:

Governance and Regulations Implications on Machine Learning (Brief Announcement). 208-211 - Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:

Simulating Homomorphic Evaluation of Deep Learning Predictions. 212-230 - Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha:

Everything Is in the Name - A URL Based Approach for Phishing Detection. 231-248 - Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin:

Network Cloudification - (Extended Abstract). 249-259 - Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal

, Rami Puzis
, Ariel Felner
:
New Goal Recognition Algorithms Using Attack Graphs. 260-278 - Amit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla:

PeerClear: Peer-to-Peer Bot-net Detection. 279-295 - Miroslaw Kutylowski, Lukasz Krzywiecki

, Xiaofeng Chen:
Rethinking Identification Protocols from the Point of View of the GDPR. 296-315 - Meir Kalech, Amit Shlomo, Robert Moskovitch:

Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement). 316-319 - Lukasz Krzywiecki

, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement). 320-323 - Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou

:
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement). 324-327

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














