default search action
3rd CSCML 2019: Beer-Sheva, Israel
- Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung:
Cyber Security Cryptography and Machine Learning - Third International Symposium, CSCML 2019, Beer-Sheva, Israel, June 27-28, 2019, Proceedings. Lecture Notes in Computer Science 11527, Springer 2019, ISBN 978-3-030-20950-6 - Ori Shmuel, Asaf Cohen, Omer Gurewitz:
Jamming Strategies in Covert Communication. 1-15 - Tomer Ashur, Orr Dunkelman, Nael Masalha:
Linear Cryptanalysis Reduced Round of Piccolo-80. 16-32 - Nir Drucker, Shay Gueron:
Continuous Key Agreement with Reduced Bandwidth. 33-46 - Yoram Segal, Ofer Hadar:
Covert Channel Cyber-Attack over Video Stream DCT Payload - (Copyright Protection Algorithm for Video and Audio Streams). 47-66 - Shlomi Arnon, Judy Kupferman:
Effects of Weather on Drone to IoT QKD. 67-74 - Ajay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla:
Malware Classification Using Image Representation. 75-92 - Philip Derbeko, Shlomi Dolev, Ehud Gudes:
MLDStore - DNNs as Similitude Models for Sharing Big Data (Brief Announcement). 93-96 - Elisabeth Drayer, Tirza Routtenberg:
Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement). 97-100 - Shlomi Dolev, Yuval Poleg:
Beyond Replications in Blockchain - On/Off-Blockchain IDA for Storage Efficiency and Confidentiality (Brief Announcement). 101-105 - Alexander Binun, Shlomi Dolev, Tal Hadad:
Self-stabilizing Byzantine Consensus for Blockchain - (Brief Announcement). 106-110 - Shoni Gilboa, Shay Gueron:
The Advantage of Truncated Permutations. 111-120 - Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu:
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution. 121-140 - Nir Drucker, Shay Gueron:
Generating a Random String with a Fixed Weight. 141-155 - Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes:
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility. 156-168 - Kevin Alex Zhang, Kalyan Veeramachaneni:
Enhancing Image Steganalysis with Adversarially Generated Examples. 169-177 - Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba:
Controllable Privacy Preserving Blockchain - FiatChain: Distributed Privacy Preserving Cryptocurrency with Law Enforcement Capabilities. 178-197 - Itai Dinur, Natan Elul:
A Relay Attack on a Tamper Detection System (Brief Announcement). 198-201 - Ron Shoham, Haim H. Permuter:
Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement). 202-207 - Sima Nadler, Orna Raz, Marcel Zalmanovici:
Governance and Regulations Implications on Machine Learning (Brief Announcement). 208-211 - Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev:
Simulating Homomorphic Evaluation of Deep Learning Predictions. 212-230 - Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha:
Everything Is in the Name - A URL Based Approach for Phishing Detection. 231-248 - Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin:
Network Cloudification - (Extended Abstract). 249-259 - Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner:
New Goal Recognition Algorithms Using Attack Graphs. 260-278 - Amit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla:
PeerClear: Peer-to-Peer Bot-net Detection. 279-295 - Miroslaw Kutylowski, Lukasz Krzywiecki, Xiaofeng Chen:
Rethinking Identification Protocols from the Point of View of the GDPR. 296-315 - Meir Kalech, Amit Shlomo, Robert Moskovitch:
Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement). 316-319 - Lukasz Krzywiecki, Miroslaw Kutylowski, Jakub Pezda, Marcin Slowik:
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement). 320-323 - Vasiliki Liagkou, Paul G. Spirakis, Yannis C. Stamatiou:
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement). 324-327
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.