
Cyber Security, Cryptology, and Machine Learning (eBook, PDF)
9th International Symposium, CSCML 2025, Be'er Sheva, Israel, December 4-5, 2025, Proceedings
Redaktion: Akavia, Adi; Puzis, Rami; Lysyanskaya, Anna; Dolev, Shlomi
Versandkostenfrei!
Sofort per Download lieferbar
59,95 €
inkl. MwSt.
Weitere Ausgaben:
PAYBACK Punkte
30 °P sammeln!
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4-5, 2025.The 17 regular papers and 9 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on Cyber security design; secure software development methodologies; formal methods, semantics, and verification of secure systems; fault tolerance, reliability, and availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery, self...
This volume constitutes the proceedings of 9th International Symposium on Cyber Security, Cryptology, and Machine Learning, CSCML 2025, in Be'er Sheva, Israel, during December 4-5, 2025.
The 17 regular papers and 9 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on Cyber security design; secure software development methodologies; formal methods, semantics, and verification of secure systems; fault tolerance, reliability, and availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery, self-stabilizing, and self-organizing systems; communication, authentication, and identification security; cyber security for mobile systems and the Internet of Things; and much more.
The 17 regular papers and 9 short papers presented here were carefully reviewed and selected from 43 submissions. These papers focus on Cyber security design; secure software development methodologies; formal methods, semantics, and verification of secure systems; fault tolerance, reliability, and availability of distributed secure systems; game-theoretic approaches to secure computing; automatic recovery, self-stabilizing, and self-organizing systems; communication, authentication, and identification security; cyber security for mobile systems and the Internet of Things; and much more.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.