{"title":"Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement)","authors":"E. Drayer, T. Routtenberg","doi":"10.1007/978-3-030-20951-3_8","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_8","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124199892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Relay Attack on a Tamper Detection System (Brief Announcement)","authors":"Itai Dinur, Natan Elul","doi":"10.1007/978-3-030-20951-3_17","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_17","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"2017 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121002905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)","authors":"V. Liagkou, P. Spirakis, Y. Stamatiou","doi":"10.1007/978-3-030-20951-3_28","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_28","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115084390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Covert Channel Cyber-Attack over Video Stream DCT Payload - (Copyright Protection Algorithm for Video and Audio Streams)","authors":"Yoram Segal, O. Hadar","doi":"10.1007/978-3-030-20951-3_4","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_4","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128619375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
L. Krzywiecki, Mirosław Kutyłowski, J. Pezda, Marcin Slowik
{"title":"Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)","authors":"L. Krzywiecki, Mirosław Kutyłowski, J. Pezda, Marcin Slowik","doi":"10.1007/978-3-030-20951-3_27","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_27","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125655341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement)","authors":"Meir Kalech, Amit Shlomo, Robert Moskovitch","doi":"10.1007/978-3-030-20951-3_26","DOIUrl":"https://doi.org/10.1007/978-3-030-20951-3_26","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124625158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Tomer Yeminy, Eyal Wohlgemuth, D. Sadot, Z. Zalevsky
{"title":"Optical Cryptography for Cyber Secured and Stealthy Fiber-Optic Communication Transmission - Invited Paper","authors":"Tomer Yeminy, Eyal Wohlgemuth, D. Sadot, Z. Zalevsky","doi":"10.1007/978-3-319-94147-9_1","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_1","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131674970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}