Lavoisier S.A.S.
14 rue de Provigny
94236 Cachan cedex
FRANCE

Heures d'ouverture 08h30-12h30/13h30-17h30
Tél.: +33 (0)1 47 40 67 00
Fax: +33 (0)1 47 40 67 02


Url canonique : www.lavoisier.fr/livre/informatique/cyber-security-cryptography-and-machine-learning/descriptif_3960555
Url courte ou permalien : www.lavoisier.fr/livre/notice.asp?ouvrage=3960555

Cyber Security Cryptography and Machine Learning, 1st ed. 2017 First International Conference, CSCML 2017, Beer-Sheva, Israel, June 29-30, 2017, Proceedings Security and Cryptology Series

Langue : Anglais

Coordonnateurs : Dolev Shlomi, Lodha Sachin

Couverture de l’ouvrage Cyber Security Cryptography and Machine Learning

This book constitutes the proceedings of the first International Symposium on Cyber Security Cryptography and Machine Learning, held in Beer-Sheva, Israel, in June 2017.

The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery of self-stabilizing and self-organizing systems; communication, authentication and identification security; cyber security for mobile and Internet of things; cyber security of corporations; security and privacy for cloud, edge and fog computing; cryptography; cryptographic implementation analysis and construction;  secure multi-party computation; privacy-enhancing technologies and anonymity; post-quantum cryptography and security; machine learning and big data; anomaly detection and malware identification; business intelligence and security; digital forensics; digital rights management; trust management and reputation systems; information retrieval, risk analysis, DoS.

Cyber security.-Secure software development methodologies, formal methods semantics and verification of secure systems.-Fault tolerance, reliability, availability of distributed secure systems.- Game-theoretic approaches to secure computing.- Automatic recovery of self-stabilizing and self-organizing systems.- Communication, authentication and identification security.- Cyber security for mobile and Internet of things.- Cyber security of corporations.- Security and privacy for cloud, edge and fog computing.-Ccryptography.- Cryptographic implementation analysis and construction.-  Secure multi-party computation.- Privacy-enhancing technologies and anonymity.- Post-quantum cryptography and security.- Machine learning and big data.- Anomaly detection and malware identification.- Business intelligence and security.- Digital forensics.- Digital rights management; trust management and reputation systems.- Information retrieval, risk analysis, DoS.></p></p>

Includes supplementary material: sn.pub/extras

Date de parution :

Ouvrage de 307 p.

15.5x23.5 cm

Disponible chez l'éditeur (délai d'approvisionnement : 15 jours).

Prix indicatif 68,56 €

Ajouter au panier