International Conference on Cyber Security Cryptography and Machine Learning最新文献

筛选
英文 中文
Detecting Clickbait in Online Social Media: You Won't Believe How We Did It 检测在线社交媒体中的标题党:你不会相信我们是怎么做到的
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-10-18 DOI: 10.1007/978-3-031-07689-3_28
Aviad Elyashar, Jorge Bendahan, Rami Puzis
{"title":"Detecting Clickbait in Online Social Media: You Won't Believe How We Did It","authors":"Aviad Elyashar, Jorge Bendahan, Rami Puzis","doi":"10.1007/978-3-031-07689-3_28","DOIUrl":"https://doi.org/10.1007/978-3-031-07689-3_28","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125576499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A Planning Approach to Monitoring Computer Programs' Behavior 监控计算机程序行为的计划方法
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-09-11 DOI: 10.1007/978-3-319-94147-9_19
Alexandre Cukier, R. Brafman, Yotam Perkal, David Tolpin
{"title":"A Planning Approach to Monitoring Computer Programs' Behavior","authors":"Alexandre Cukier, R. Brafman, Yotam Perkal, David Tolpin","doi":"10.1007/978-3-319-94147-9_19","DOIUrl":"https://doi.org/10.1007/978-3-319-94147-9_19","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122769486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Learning Representations for Log Data in Cybersecurity 网络安全中日志数据表示的学习
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_19
Ignacio Arnaldo, Alfredo Cuesta-Infante, A. Arun, Mei Lam, Costas Bassias, K. Veeramachaneni
{"title":"Learning Representations for Log Data in Cybersecurity","authors":"Ignacio Arnaldo, Alfredo Cuesta-Infante, A. Arun, Mei Lam, Costas Bassias, K. Veeramachaneni","doi":"10.1007/978-3-319-60080-2_19","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_19","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"29 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120866313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
Stylometric Authorship Attribution of Collaborative Documents 协作文档的文体计量作者归属
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_9
Edwin Dauber, R. Overdorf, R. Greenstadt
{"title":"Stylometric Authorship Attribution of Collaborative Documents","authors":"Edwin Dauber, R. Overdorf, R. Greenstadt","doi":"10.1007/978-3-319-60080-2_9","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_9","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121025122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
The Combinatorics of Product Scanning Multiplication and Squaring 乘积扫描乘法和平方的组合学
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_8
Adam L. Young, M. Yung
{"title":"The Combinatorics of Product Scanning Multiplication and Squaring","authors":"Adam L. Young, M. Yung","doi":"10.1007/978-3-319-60080-2_8","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_8","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126643764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Brief Announcement: A Consent Management Solution for Enterprises 简要公告:企业同意管理解决方案
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_13
Abigail Goldsteen, Shelly Garion, Sima Nadler, N. Razinkov, Y. Moatti, Paula Ta-Shma
{"title":"Brief Announcement: A Consent Management Solution for Enterprises","authors":"Abigail Goldsteen, Shelly Garion, Sima Nadler, N. Razinkov, Y. Moatti, Paula Ta-Shma","doi":"10.1007/978-3-319-60080-2_13","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_13","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract) 使用反病毒诱导标签的受感染机器的监督检测-(扩展摘要)
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_3
T. Cohen, Danny Hendler, Dennis Potashnik
{"title":"Supervised Detection of Infected Machines Using Anti-virus Induced Labels - (Extended Abstract)","authors":"T. Cohen, Danny Hendler, Dennis Potashnik","doi":"10.1007/978-3-319-60080-2_3","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_3","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125918930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Distributed Investment Encryption Scheme: Investcoin 分布式投资加密方案:Investcoin
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_10
Filipp Valovich
{"title":"A Distributed Investment Encryption Scheme: Investcoin","authors":"Filipp Valovich","doi":"10.1007/978-3-319-60080-2_10","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_10","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134504037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Attack Graph Obfuscation 攻击图混淆
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_20
Hadar Polad, Rami Puzis, Bracha Shapira
{"title":"Attack Graph Obfuscation","authors":"Hadar Polad, Rami Puzis, Bracha Shapira","doi":"10.1007/978-3-319-60080-2_20","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_20","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"129 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115359094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Symmetric-Key Broadcast Encryption: The Multi-sender Case 对称密钥广播加密:多发送方情况
International Conference on Cyber Security Cryptography and Machine Learning Pub Date : 2017-06-29 DOI: 10.1007/978-3-319-60080-2_16
Cody R. Freitag, Jonathan Katz, Nathan Klein
{"title":"Symmetric-Key Broadcast Encryption: The Multi-sender Case","authors":"Cody R. Freitag, Jonathan Katz, Nathan Klein","doi":"10.1007/978-3-319-60080-2_16","DOIUrl":"https://doi.org/10.1007/978-3-319-60080-2_16","url":null,"abstract":"","PeriodicalId":209112,"journal":{"name":"International Conference on Cyber Security Cryptography and Machine Learning","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133561676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信