logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings

Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback)

Jonathan Katz, Amnon Meisels, Shlomi Dolev (엮은이)
Springer
231,360원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
189,710원 -18% 0원
9,490원
180,220원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings
eBook 미리보기

책 정보

· 제목 : Cyber Security, Cryptology, and Machine Learning: 6th International Symposium, CSCML 2022, Be'er Sheva, Israel, June 30 - July 1, 2022, Proceedings (Paperback) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783031076886
· 쪽수 : 508쪽
· 출판일 : 2022-05-31

목차

Blind Rotation in Fully Homomorphic Encryption with Extended Keys.- Monitoring Time Series With Missing Values: a Deep Probabilistic Approach.- Time, Memory and Accuracy Tradeoffs in Side-Channel Trace Profiling.- Design of Intrusion Detection System based on Logical Analysis of Data (LAD) using Information Gain Ratio.- Simulating a Coupon Collector.- On the undecidability of the Panopticon detection problem.- Privacy-Preserving Contrastive Explanations with Local Foil Trees.- Timing leakage analysis of non-constant-time NTT implementations with Harvey butterflies.- Predicting the direction of changes in the values of time series for relatively small training samples.- Machine-Learning Based Objective Function Selection for Community Detection.- Randomness for Randomness Testing.- Botnet attack identification based on SDN.- Setting up an anonymous gesture database as well as enhancing it with a verbal script simulator for rehabilitation applications.- Fake News Detection in Social Networks using Machine Learning and Trust.- Reinforcement Based User Scheduling for Cellular Communications.- A Heuristic Framework to search for Approximate Mutually Unbiased Bases.- Counter Mode for Long Messages and a Long Nonce.- Transfer learning for time series classification using synthetic data generation.- Non-Stopping Junctions via Traffic Scheduling.- Predicting subscriber usage: Analyzing multidimensional time-series using Convolutional Neural Networks.- Smart Cybercrime Classification for Digital Forensics with Small Datasets.- Auditable, Available and Resilient Private Computation on the Blockchain via MPC.- Union Buster: A Cross-Container Covert-Channel Exploiting Union Mounting.- Mutual Accountability Layer: Accountable Anonymity within Accountable Trust.- Faster Post-Quantum TLS handshakes Without Intermediate CA Certificates.- Enhancing Cybersecurity of Satellites at sub-THz Bands.- Polynomial Approximation of Inverse sqrt Function for FHE.- Detecting Clickbait in Online Social Media: You Won’t Believe How We Did It.- Etherless Ethereum Tokens: Simulating Native Tokens in Ethereum.- A Linear-Time 2-Party Secure Merge Protocol.- FairMM: A Fast and Frontrunning-Resistant Crypto Market-Maker.-In-app Cryptographically-Enforced Selective Access Control for Microsoft Office and Similar Platforms.- Differentially-Private ``Draw and Discard'' Machine Learning: Training Distributed Models from Enormous Crowds.- Privacy Preserving Solution of DCOPs by Mediation.- BFLUT Bloom Filter for Private Look Up Tables.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책