International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors 基于用户属性可信度和连接强度因素的在线社交网络信息流控制模型
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_5
E. Gudes, Nadav Voloch
{"title":"An Information-Flow Control Model for Online Social Networks Based on User-Attribute Credibility and Connection-Strength Factors","authors":"E. Gudes, Nadav Voloch","doi":"10.1007/978-3-319-94147-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_5","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124186638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules 简要公告:西方电子规则适应性版本的对抗性规避
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_22
Oded Margalit
{"title":"Brief Announcement: Adversarial Evasion of an Adaptive Version of Western Electric Rules","authors":"Oded Margalit","doi":"10.1007/978-3-319-94147-9_22","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_22","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117286845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brief Announcement: Deriving Context for Touch Events 简短公告:为触摸事件派生上下文
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_23
M. Azran, Niv Ben Shabat, Tal Shkolnik, Yossef Oren
{"title":"Brief Announcement: Deriving Context for Touch Events","authors":"M. Azran, Niv Ben Shabat, Tal Shkolnik, Yossef Oren","doi":"10.1007/978-3-319-94147-9_23","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_23","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130731571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Brief Announcement: Image Authentication Using Hyperspectral Layers 简短公告:使用高光谱层的图像认证
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_14
G. Leshem, M. Domb
{"title":"Brief Announcement: Image Authentication Using Hyperspectral Layers","authors":"G. Leshem, M. Domb","doi":"10.1007/978-3-319-94147-9_14","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_14","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126805181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards Building Active Defense Systems for Software Applications 构建面向软件应用的主动防御系统
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_12
Zara Perumal, K. Veeramachaneni
{"title":"Towards Building Active Defense Systems for Software Applications","authors":"Zara Perumal, K. Veeramachaneni","doi":"10.1007/978-3-319-94147-9_12","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_12","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124569644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks 简要公告:在低功耗广域网中提供端到端安全通信
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_8
I. Chatzigiannakis, V. Liagkou, P. Spirakis
{"title":"Brief Announcement: Providing End-to-End Secure Communication in Low-Power Wide Area Networks","authors":"I. Chatzigiannakis, V. Liagkou, P. Spirakis","doi":"10.1007/978-3-319-94147-9_8","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_8","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"346 11","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract) 算术流和函数的一轮安全多方计算-(扩展摘要)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_20
Dor Bitan, S. Dolev
{"title":"One-Round Secure Multiparty Computation of Arithmetic Streams and Functions - (Extended Abstract)","authors":"Dor Bitan, S. Dolev","doi":"10.1007/978-3-319-94147-9_20","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_20","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128167316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious Attacks 简要公告:基于图和概率离散模型在恶意攻击检测中的应用
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_15
S. Frenkel, V. Zakharov
{"title":"Brief Announcement: Graph-Based and Probabilistic Discrete Models Used in Detection of Malicious Attacks","authors":"S. Frenkel, V. Zakharov","doi":"10.1007/978-3-319-94147-9_15","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_15","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134042309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems 基于生物特征识别和认证系统的安全非交互式用户重新注册
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_13
I. O. Nunes, Karim M. El Defrawy, Tancrède Lepoint
{"title":"Secure Non-interactive User Re-enrollment in Biometrics-Based Identification and Authentication Systems","authors":"I. O. Nunes, Karim M. El Defrawy, Tancrède Lepoint","doi":"10.1007/978-3-319-94147-9_13","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_13","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"231 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122693707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors 基于故障检测器的自稳定拜占庭容错复制状态机
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_7
S. Dolev, Chryssis Georgiou, Ioannis Marcoullis, E. Schiller
{"title":"Self-stabilizing Byzantine Tolerant Replicated State Machine Based on Failure Detectors","authors":"S. Dolev, Chryssis Georgiou, Ioannis Marcoullis, E. Schiller","doi":"10.1007/978-3-319-94147-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_7","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114253382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信