9783319941462-3319941461-Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology)

Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology)

ISBN-13: 9783319941462
ISBN-10: 3319941461
Edition: 1st ed. 2018
Author: Itai Dinur, Shlomi Dolev, Sachin Lodha
Publication date: 2018
Publisher: Springer
Format: Paperback 299 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9783319941462
ISBN-10: 3319941461
Edition: 1st ed. 2018
Author: Itai Dinur, Shlomi Dolev, Sachin Lodha
Publication date: 2018
Publisher: Springer
Format: Paperback 299 pages

Summary

Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology) (ISBN-13: 9783319941462 and ISBN-10: 3319941461), written by authors Itai Dinur, Shlomi Dolev, Sachin Lodha, was published by Springer in 2018. With an overall rating of 3.9 stars, it's a notable title among other AI & Machine Learning (Computer Science, Data Mining, Databases & Big Data, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Operating Systems, History & Culture) books. You can easily purchase or rent Cyber Security Cryptography and Machine Learning: Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used AI & Machine Learning books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018. The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book