標(biāo)題: Titlebook: Cyber Security Cryptography and Machine Learning; First International Shlomi Dolev,Sachin Lodha Conference proceedings 2017 Springer Inter [打印本頁(yè)] 作者: MOURN 時(shí)間: 2025-3-21 18:09
書(shū)目名稱Cyber Security Cryptography and Machine Learning影響因子(影響力)
書(shū)目名稱Cyber Security Cryptography and Machine Learning影響因子(影響力)學(xué)科排名
書(shū)目名稱Cyber Security Cryptography and Machine Learning網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Cyber Security Cryptography and Machine Learning網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Cyber Security Cryptography and Machine Learning被引頻次
書(shū)目名稱Cyber Security Cryptography and Machine Learning被引頻次學(xué)科排名
書(shū)目名稱Cyber Security Cryptography and Machine Learning年度引用
書(shū)目名稱Cyber Security Cryptography and Machine Learning年度引用學(xué)科排名
書(shū)目名稱Cyber Security Cryptography and Machine Learning讀者反饋
書(shū)目名稱Cyber Security Cryptography and Machine Learning讀者反饋學(xué)科排名
作者: PET-scan 時(shí)間: 2025-3-21 22:38
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage,We present a version of Camenisch-Lysyanskaya’s anonymous credential system immune to attacks based on leakage of ephemeral values used during protocol execution. While preserving “provable security” of the original design, our scheme improves its security in a realistic scenario of an imperfect implementation on a cryptographic device.作者: 衣服 時(shí)間: 2025-3-22 04:09 作者: CAMEO 時(shí)間: 2025-3-22 05:26
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/d/image/241746.jpg作者: 上下連貫 時(shí)間: 2025-3-22 10:56
Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Fa malicious attacks, and can distort values of variables, operations, the codes, etc., is solved by applying the widely used Fault Injection (FI) simulation technique. Main drawback of the FI is necessity to have different expensive software that can not be used to solve other design problems, in particular verification and testing.作者: gospel 時(shí)間: 2025-3-22 13:50
Varieties of Abnormal Behavioursed for deriving cryptographic keys from biometric data. FEs rely in their operation on a public “helper string” that is guaranteed not to leak too much information about the original input. Unfortunately, this guarantee may not hold when . independent helper strings are generated from correlated in作者: gospel 時(shí)間: 2025-3-22 19:54 作者: Ethics 時(shí)間: 2025-3-22 23:02 作者: SCORE 時(shí)間: 2025-3-23 03:09
https://doi.org/10.1007/978-1-349-16831-6ymous while server processes maintaining the state of the register may be compromised by rational adversaries (i.e., a server might behave as . process). We first model our problem as a Bayesian game between a client and a rational malicious server where the equilibrium depends on the decisions of t作者: Myosin 時(shí)間: 2025-3-23 07:36 作者: 逗留 時(shí)間: 2025-3-23 10:07
https://doi.org/10.1007/978-1-349-16144-7phy. However, it was known that a self-bilinear map on a cyclic group of a known order cannot be cryptographically secure. In 2014, Yamakawa et al. presented a self-bilinear map, the YYHK pairing, on unknown order groups by using an indistinguishability obfuscator as a building block. In this paper,作者: 過(guò)度 時(shí)間: 2025-3-23 13:52 作者: BAIL 時(shí)間: 2025-3-23 21:31
https://doi.org/10.1057/9781137562210ply stylometry to a novel dataset of multi-authored documents collected from Wikia using both relaxed classification with a support vector machine (SVM) and multi-label classification techniques. We define five possible scenarios and show that one, the case where labeled and unlabeled collaborative 作者: REP 時(shí)間: 2025-3-24 00:49 作者: Optometrist 時(shí)間: 2025-3-24 05:34
A Theory of Branched Minimal Surfacescoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result by Chen and Han Vin作者: mettlesome 時(shí)間: 2025-3-24 08:31 作者: 放氣 時(shí)間: 2025-3-24 12:10 作者: 生來(lái) 時(shí)間: 2025-3-24 16:52 作者: adroit 時(shí)間: 2025-3-24 20:39 作者: 非秘密 時(shí)間: 2025-3-25 02:47
An Imperative Sequential Calculushat can be decrypted only by a designated subset of those receivers, has received a significant amount of attention. Here, we consider a generalization of this problem in which . members of the group must have the ability to act as both sender and receiver. The parameters of interest are the number 作者: sebaceous-gland 時(shí)間: 2025-3-25 05:27 作者: 空氣 時(shí)間: 2025-3-25 07:41 作者: Outspoken 時(shí)間: 2025-3-25 12:15 作者: 代替 時(shí)間: 2025-3-25 18:41
Cyber Security Cryptography and Machine Learning978-3-319-60080-2Series ISSN 0302-9743 Series E-ISSN 1611-3349 作者: Acetaminophen 時(shí)間: 2025-3-25 23:43
Formalisms and Distributed Calculi malicious attacks, and can distort values of variables, operations, the codes, etc., is solved by applying the widely used Fault Injection (FI) simulation technique. Main drawback of the FI is necessity to have different expensive software that can not be used to solve other design problems, in particular verification and testing.作者: Goblet-Cells 時(shí)間: 2025-3-26 02:37 作者: 親密 時(shí)間: 2025-3-26 06:26
978-3-319-60079-6Springer International Publishing AG 2017作者: 細(xì)胞學(xué) 時(shí)間: 2025-3-26 09:27 作者: definition 時(shí)間: 2025-3-26 16:00
G,F,: Improving Cyber Security Using Realistic Synthetic Face Generation, increased use of biometrics (such as faces) triggered a lot of research on the protection biometric data in the fields of computer security and cryptography..Unfortunately, most of the face-based systems, and most notably the privacy-preserving mechanisms, are evaluated on small data sets or assume作者: Insufficient 時(shí)間: 2025-3-26 18:06 作者: 安撫 時(shí)間: 2025-3-27 00:25 作者: 開(kāi)始從未 時(shí)間: 2025-3-27 02:12 作者: acolyte 時(shí)間: 2025-3-27 05:20
On Pairing Inversion of the Self-bilinear Map on Unknown Order Groups,phy. However, it was known that a self-bilinear map on a cyclic group of a known order cannot be cryptographically secure. In 2014, Yamakawa et al. presented a self-bilinear map, the YYHK pairing, on unknown order groups by using an indistinguishability obfuscator as a building block. In this paper,作者: syncope 時(shí)間: 2025-3-27 10:10
The Combinatorics of Product Scanning Multiplication and Squaring,ultiplication and squaring requires fewer memory accesses than the competing approach called .. A correctness proof for product scanning loop logic will assure that the method works as intended (beyond engineering testing) and will improve understanding of it. However, no proofs of correctness for p作者: 柳樹(shù);枯黃 時(shí)間: 2025-3-27 17:25
Stylometric Authorship Attribution of Collaborative Documents,ply stylometry to a novel dataset of multi-authored documents collected from Wikia using both relaxed classification with a support vector machine (SVM) and multi-label classification techniques. We define five possible scenarios and show that one, the case where labeled and unlabeled collaborative 作者: Omniscient 時(shí)間: 2025-3-27 18:33
A Distributed Investment Encryption Scheme: Investcoin, funds to independent projects, in the same way as it works on crowdfunding platforms. The framework protects the investors’ single payments from being detected (by any other party), only the sums of each investor’s payments are revealed (e.g. to the system). Likewise, the projects’ single incoming 作者: constellation 時(shí)間: 2025-3-27 22:34 作者: Ligament 時(shí)間: 2025-3-28 02:43
Assisting Malware Analysis with Symbolic Execution: A Case Study, tools. Devising automated tools and techniques to assist and speed up the analysis process remains a major endeavor in computer security. While manual intervention will likely remain a key ingredient in the short and mid term, the recent advances in static and dynamic analysis techniques have the p作者: 牲畜欄 時(shí)間: 2025-3-28 08:19 作者: 繁榮地區(qū) 時(shí)間: 2025-3-28 10:36 作者: BUDGE 時(shí)間: 2025-3-28 14:46
Brief Announcement: A Technique for Software Robustness Analysis in Systems Exposed to Transient Fa malicious attacks, and can distort values of variables, operations, the codes, etc., is solved by applying the widely used Fault Injection (FI) simulation technique. Main drawback of the FI is necessity to have different expensive software that can not be used to solve other design problems, in par作者: MURAL 時(shí)間: 2025-3-28 20:56 作者: forebear 時(shí)間: 2025-3-28 22:55
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System,anksealer was unable to exploit analyst feedback to self-tune and improve its performance. It also depended on a complex set of parameters that had to be tuned by hand before operations..To overcome both these limitations, we propose a supervised evolutionary wrapper approach, that considers analyst作者: 不如樂(lè)死去 時(shí)間: 2025-3-29 06:52
Scalable Attack Path Finding for Increased Security,ompromising other hosts until they create a path to the critical assets. Consequently, network administrators must examine the protected network as a whole rather than each vulnerable host independently. To this end, various methods were suggested in order to analyze the multitude of attack paths in作者: 漸變 時(shí)間: 2025-3-29 07:33 作者: 行業(yè) 時(shí)間: 2025-3-29 13:58
Building Regular Registers with Rational Malicious Servers and Anonymous Clients,he malicious server (behave correctly and not be detected by clients vs returning a wrong register value to clients with the risk of being detected and then excluded by the computation). We prove such equilibrium exists and finally we design a protocol implementing the regular register that forces the rational malicious server to behave correctly.作者: Glutinous 時(shí)間: 2025-3-29 19:32
Brief Announcement: A Consent Management Solution for Enterprises,IT solutions that can address these privacy issues are still lacking. We briefly outline our solution and its main component called “Consent Manager”, for the management, automatic enforcement and auditing of user consent. We then describe how the Consent Manager was adopted as part of the European FP7 project COSMOS.作者: 創(chuàng)造性 時(shí)間: 2025-3-29 21:35
0302-9743 and Machine Learning, held in Beer-Sheva, Israel, in June 2017..The 17 full and 4 short papers presented include cyber security; secure software development methodologies, formal methods semantics and verification of secure systems; fault tolerance, reliability, availability of distributed secure sy作者: interrupt 時(shí)間: 2025-3-29 23:57 作者: 粘 時(shí)間: 2025-3-30 07:36 作者: PACT 時(shí)間: 2025-3-30 09:58 作者: 泥土謙卑 時(shí)間: 2025-3-30 13:36 作者: AUGUR 時(shí)間: 2025-3-30 20:34
A Supervised Auto-Tuning Approach for a Banking Fraud Detection System, multi-objective genetic algorithm..We deployed our solution in a real-world setting of a large national banking group and conducted an in-depth experimental evaluation. We show that the proposed system was able to detect sophisticated frauds, improving Banksealer’s performance of up?to 35% in some cases.作者: landmark 時(shí)間: 2025-3-31 00:22
Varieties of Abnormal Behaviourble. This is interesting as the first natural example of a non-reusable FE. We then show how to adapt their construction to obtain reusable?FEs. Of independent interest, we show a generic technique for strengthening the notion of reusability achieved by an FE in the random-oracle model.作者: 圖表證明 時(shí)間: 2025-3-31 01:00 作者: 無(wú)能力 時(shí)間: 2025-3-31 07:09 作者: chastise 時(shí)間: 2025-3-31 11:09
https://doi.org/10.1057/9781137562210ce. Additionally, we perform authorship attribution of pre-segmented text from the Wikia dataset, and show that while this performs better than multi-label learning it requires large amounts of data to be successful.作者: 他很靈活 時(shí)間: 2025-3-31 17:09 作者: 有助于 時(shí)間: 2025-3-31 17:48 作者: constitutional 時(shí)間: 2025-3-31 22:27
Classical Linearized Elasticityundaries with reported command and control communications. The presented results validate our approach, achieving an area under the ROC curve of 0.943 and 95 true positives out of the Top 100 ranked instances on the test data set.作者: 獨(dú)輪車(chē) 時(shí)間: 2025-4-1 05:27 作者: 河潭 時(shí)間: 2025-4-1 07:36
Supervised Detection of Infected Machines Using Anti-virus Induced Labels,t for identifying malware. Using this training set, our detector is able to automatically detect complex and dynamic patterns of suspicious machine behavior and issue high-quality security alerts. We believe that our approach can be used for providing a detection scheme that complements signature-based detection and is harder to circumvent.作者: FRET 時(shí)間: 2025-4-1 11:11 作者: 羅盤(pán) 時(shí)間: 2025-4-1 15:30
Stylometric Authorship Attribution of Collaborative Documents,ce. Additionally, we perform authorship attribution of pre-segmented text from the Wikia dataset, and show that while this performs better than multi-label learning it requires large amounts of data to be successful.作者: 使苦惱 時(shí)間: 2025-4-1 22:14 作者: 不再流行 時(shí)間: 2025-4-2 00:39
Scalable Attack Path Finding for Increased Security,ng and eliminating optimal attacker paths. Results on an attack graph extracted from a network of a real organization with more than 300 hosts and 2400 vulnerabilities show that using the proposed graph reductions can improve the search time by a factor of 4 while maintaining the quality of the results.作者: Coma704 時(shí)間: 2025-4-2 05:01