
Cyber Security, Cryptology, and Machine Learning
9th International Symposium, CSCML 2025, Be'er Sheva, Israel, December 4-5, 2025, Proceedings
Herausgegeben: Akavia, Adi; Dolev, Shlomi; Lysyanskaya, Anna; Puzis, Rami
PAYBACK Punkte
28 °P sammeln!
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4 5, 2025.The 17 regular papers and 9 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on Cyber security design; secure software development methodologies; formal methods, semantics, and verification of secure systems; fault tolerance, reliability, and availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery,self-...
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4 5, 2025.
The 17 regular papers and 9 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on Cyber security design; secure software development methodologies; formal methods, semantics, and verification of secure systems; fault tolerance, reliability, and availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery,
self-stabilizing, and self-organizing systems; communication, authentication, and identification security; cyber security for mobile systems and the Internet of Things; and much more.
The 17 regular papers and 9 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on Cyber security design; secure software development methodologies; formal methods, semantics, and verification of secure systems; fault tolerance, reliability, and availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery,
self-stabilizing, and self-organizing systems; communication, authentication, and identification security; cyber security for mobile systems and the Internet of Things; and much more.