


default search action
2nd CSCML 2018: Beer-Sheva, Israel
- Itai Dinur, Shlomi Dolev

, Sachin Lodha:
Cyber Security Cryptography and Machine Learning - Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21-22, 2018, Proceedings. Lecture Notes in Computer Science 10879, Springer 2018, ISBN 978-3-319-94146-2 - Tomer Yeminy, Eyal Wohlgemuth, Dan Sadot

, Zeev Zalevsky:
Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission - Invited Paper. 1-5 - Orr Dunkelman

, Ariel Weizman
:
Efficient Construction of the Kite Generator Revisited. 6-19 - Daniel M. Bittner, Anand D. Sarwate

, Rebecca N. Wright:
Using Noisy Binary Search for Differentially Private Anomaly Detection. 20-37 - Trishita Tiwari, David Starobinski, Ari Trachtenberg:

Distributed Web Mining of Ethereum. 38-54 - Ehud Gudes, Nadav Voloch

:
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors. 55-67 - Yoram Segal, Dan Vilenchik, Ofer Hadar

:
Detecting and Coloring Anomalies in Real Cellular Network Using Principle Component Analysis. 68-83 - Shlomi Dolev, Chryssis Georgiou, Ioannis Marcoullis, Elad Michael Schiller:

Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors. 84-100 - Ioannis Chatzigiannakis

, Vasiliki Liagkou, Paul G. Spirakis:
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks. 101-104 - Philip Derbeko, Shlomi Dolev, Ehud Gudes:

Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation. 105-119 - Ron Shoham, Haim H. Permuter:

Highway State Gating for Recurrent Highway Networks: Improving Information Flow Through Time. 120-128 - Alejandro Cohen, Asaf Cohen, Omer Gurewitz:

Secured Data Gathering Protocol for IoT Networks. 129-143 - Zara Perumal, Kalyan Veeramachaneni:

Towards Building Active Defense Systems for Software Applications. 144-161 - Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint:

Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems. 162-180 - Guy Leshem, Menachem Domb:

Brief Announcement: Image Authentication Using Hyperspectral Layers. 181-183 - Sergey Frenkel, Victor N. Zakharov:

Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious Attacks. 184-187 - Mai Ben-Adar Bessos, Amir Herzberg:

Intercepting a Stealthy Network. 188-205 - Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodríguez

, Moti Yung:
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs. 206-226 - Shay Nachum, Assaf Schuster, Opher Etzion:

Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares. 227-242 - Alexandre Cukier, Ronen I. Brafman

, Yotam Perkal, David Tolpin:
A Planning Approach to Monitoring Computer Programs' Behavior. 243-254 - Dor Bitan, Shlomi Dolev:

One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract). 255-273 - Ziv Aharoni, Gal Rattner, Haim H. Permuter:

Brief Announcement: Gradual Learning of Deep Recurrent Neural Network. 274-277 - Oded Margalit:

Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules. 278-282 - Moran Azran, Niv Ben Shabat

, Tal Shkolnik, Yossi Oren
:
Brief Announcement: Deriving Context for Touch Events. 283-286

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














