International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs 电子购物交易中的隐私:探索和处理权衡
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_17
Jesús Díaz, Seung Geol Choi, David Arroyo, A. Keromytis, Francisco B. Rodríguez, M. Yung
{"title":"Privacy in e-Shopping Transactions: Exploring and Addressing the Trade-Offs","authors":"Jesús Díaz, Seung Geol Choi, David Arroyo, A. Keromytis, Francisco B. Rodríguez, M. Yung","doi":"10.1007/978-3-319-94147-9_17","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_17","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115633834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Web Mining of Ethereum 以太坊的分布式Web挖掘
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_4
Trishita Tiwari, D. Starobinski, A. Trachtenberg
{"title":"Distributed Web Mining of Ethereum","authors":"Trishita Tiwari, D. Starobinski, A. Trachtenberg","doi":"10.1007/978-3-319-94147-9_4","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_4","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125513287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Brief Announcement: Gradual Learning of Deep Recurrent Neural Network 简要公告:深度递归神经网络的渐进学习
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_21
Ziv Aharoni, Gal Rattner, H. Permuter
{"title":"Brief Announcement: Gradual Learning of Deep Recurrent Neural Network","authors":"Ziv Aharoni, Gal Rattner, H. Permuter","doi":"10.1007/978-3-319-94147-9_21","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_21","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116537210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Noisy Binary Search for Differentially Private Anomaly Detection 基于噪声二值搜索的差分私有异常检测
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_3
D. M. Bittner, A. Sarwate, R. Wright
{"title":"Using Noisy Binary Search for Differentially Private Anomaly Detection","authors":"D. M. Bittner, A. Sarwate, R. Wright","doi":"10.1007/978-3-319-94147-9_3","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_3","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation 通过维护小相似数据实现大数据统计表达的隐私
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_9
Philip Derbeko, S. Dolev, E. Gudes
{"title":"Privacy via Maintaining Small Similitude Data for Big Data Statistical Representation","authors":"Philip Derbeko, S. Dolev, E. Gudes","doi":"10.1007/978-3-319-94147-9_9","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_9","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121008149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares 在黑暗中检测-利用C&C面板中的XSS漏洞来检测恶意软件
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_18
S. Nachum, A. Schuster, O. Etzion
{"title":"Detection in the Dark - Exploiting XSS Vulnerability in C&C Panels to Detect Malwares","authors":"S. Nachum, A. Schuster, O. Etzion","doi":"10.1007/978-3-319-94147-9_18","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_18","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127204544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secured Data Gathering Protocol for IoT Networks 物联网网络安全数据采集协议
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_11
Alejandro Cohen, A. Cohen, Omer Gurewitz
{"title":"Secured Data Gathering Protocol for IoT Networks","authors":"Alejandro Cohen, A. Cohen, Omer Gurewitz","doi":"10.1007/978-3-319-94147-9_11","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_11","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"526 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123447652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detecting and Coloring Anomalies in Real Cellular Network Using Principle Component Analysis 基于主成分分析的真实蜂窝网络异常检测与着色
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_6
Yoram Segal, Dan Vilenchik, O. Hadar
{"title":"Detecting and Coloring Anomalies in Real Cellular Network Using Principle Component Analysis","authors":"Yoram Segal, Dan Vilenchik, O. Hadar","doi":"10.1007/978-3-319-94147-9_6","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_6","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124689885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Construction of the Kite Generator Revisited 重新审视风筝发电机的高效构造
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-06-21 DOI: 10.1007/978-3-319-94147-9_2
O. Dunkelman, Ariel Weizman
{"title":"Efficient Construction of the Kite Generator Revisited","authors":"O. Dunkelman, Ariel Weizman","doi":"10.1007/978-3-319-94147-9_2","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_2","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126684875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Highway State Gating for Recurrent Highway Networks: Improving Information Flow Through Time 高速公路状态门控:改善信息随时间的流动
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2018-05-23 DOI: 10.1007/978-3-319-94147-9_10
Ron Shoham, H. Permuter
{"title":"Highway State Gating for Recurrent Highway Networks: Improving Information Flow Through Time","authors":"Ron Shoham, H. Permuter","doi":"10.1007/978-3-319-94147-9_10","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_10","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123602799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信