![9783319941462-3319941461-Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology)](https://booksrun.com/image-loader/215/https:__m.media-amazon.com_images_I_41bvpv9C5BL._SL500_.jpg)
Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology)
ISBN-13:
9783319941462
ISBN-10:
3319941461
Edition:
1st ed. 2018
Author:
Itai Dinur, Shlomi Dolev, Sachin Lodha
Publication date:
2018
Publisher:
Springer
Format:
Paperback
299 pages
FREE US shipping
Book details
ISBN-13:
9783319941462
ISBN-10:
3319941461
Edition:
1st ed. 2018
Author:
Itai Dinur, Shlomi Dolev, Sachin Lodha
Publication date:
2018
Publisher:
Springer
Format:
Paperback
299 pages
Summary
Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology) (ISBN-13: 9783319941462 and ISBN-10: 3319941461), written by authors
Itai Dinur, Shlomi Dolev, Sachin Lodha, was published by Springer in 2018.
With an overall rating of 3.9 stars, it's a notable title among other
AI & Machine Learning
(Computer Science, Data Mining, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Operating Systems, History & Culture) books. You can easily purchase or rent Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology) (Paperback) from BooksRun,
along with many other new and used
AI & Machine Learning
books
and textbooks.
And, if you're looking to sell your copy, our current buyback offer is $0.3.
Description
This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.
We would LOVE it if you could help us and other readers by reviewing the book
Book review
Congratulations! We have received your book review.
{user}
{createdAt}
by {truncated_author}