{"title":"Detecting Clickbait in Online Social Media: You Won't Believe How We Did It","authors":"Aviad Elyashar, Jorge Bendahan, Rami Puzis","doi":"10.1007/978-3-031-07689-3_28","DOIUrl":"https://doi.org/10.1007/978-3-031-07689-3_28","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125576499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Alexandre Cukier, R. Brafman, Yotam Perkal, David Tolpin
{"title":"A Planning Approach to Monitoring Computer Programs' Behavior","authors":"Alexandre Cukier, R. Brafman, Yotam Perkal, David Tolpin","doi":"10.1007/978-3-319-94147-9_19","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_19","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ignacio Arnaldo, Alfredo Cuesta-Infante, A. Arun, Mei Lam, Costas Bassias, K. Veeramachaneni
{"title":"Learning Representations for Log Data in Cybersecurity","authors":"Ignacio Arnaldo, Alfredo Cuesta-Infante, A. Arun, Mei Lam, Costas Bassias, K. Veeramachaneni","doi":"10.1007/978-3-319-60080-2_19","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_19","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"29 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120866313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stylometric Authorship Attribution of Collaborative Documents","authors":"Edwin Dauber, R. Overdorf, R. Greenstadt","doi":"10.1007/978-3-319-60080-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_9","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Combinatorics of Product Scanning Multiplication and Squaring","authors":"Adam L. Young, M. Yung","doi":"10.1007/978-3-319-60080-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_8","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abigail Goldsteen, Shelly Garion, Sima Nadler, N. Razinkov, Y. Moatti, Paula Ta-Shma
{"title":"Brief Announcement: A Consent Management Solution for Enterprises","authors":"Abigail Goldsteen, Shelly Garion, Sima Nadler, N. Razinkov, Y. Moatti, Paula Ta-Shma","doi":"10.1007/978-3-319-60080-2_13","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_13","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract)","authors":"T. Cohen, Danny Hendler, Dennis Potashnik","doi":"10.1007/978-3-319-60080-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_3","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Symmetric-Key Broadcast Encryption: The Multi-sender Case","authors":"Cody R. Freitag, Jonathan Katz, Nathan Klein","doi":"10.1007/978-3-319-60080-2_16","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_16","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133561676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}