Advertisement

© 2019

Science of Cyber Security

Second International Conference, SciSec 2019, Nanjing, China, August 9–11, 2019, Revised Selected Papers

  • Feng Liu
  • Jia Xu
  • Shouhuai Xu
  • Moti Yung
Conference proceedings SciSec 2019

Part of the Lecture Notes in Computer Science book series (LNCS, volume 11933)

Also part of the Security and Cryptology book sub series (LNSC, volume 11933)

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Artificial Intelligence for Cybersecurity

    1. Front Matter
      Pages 1-1
    2. Yuan Wang, Jinzhi Wang, Jianhong Gao, Shengsheng Hu, Huacheng Sun, Yongli Wang
      Pages 3-19
    3. Kangyang Chen, Xinyi Zou, Xingguo Chen, Huihui Wang
      Pages 33-46
    4. Xiao Tu, Guo-Ping Jiang, Yurong Song
      Pages 47-58
  3. Machine Learning for Cybersecurity

    1. Front Matter
      Pages 59-59
    2. Binghui Liu, Keji Han, Jie Hang, Yun Li
      Pages 92-105
    3. Shikang Yu, Yang Wu, Yurong Song, Guoping Jiang, Xiaoping Su
      Pages 106-118
  4. Attack and Defense

    1. Front Matter
      Pages 119-119
    2. Xin Huang, Fei Yan, Liqiang Zhang, Kai Wang
      Pages 121-135
    3. Yinwei Li, Bo Song, Xu Zhang, Guo-Ping Jiang, Yurong Song
      Pages 151-162
  5. Blockchain, Attack and Defense

    1. Front Matter
      Pages 179-179
    2. Zhi Qiao, Congcong Zhu, Zhiwei Wang, Nianhua Yang
      Pages 181-189
    3. Gang Xue, Jia Xu, Hanwen Wu, Weifeng Lu, Lijie Xu
      Pages 190-198
    4. Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges
      Pages 199-214

About these proceedings

Introduction

This book constitutes the proceedings of the Second International Conference on Science of Cyber Security, SciSec 2019, held in Nanjing, China, in August 2019.

The 20 full papers and 8 short papers presented in this volume were carefully reviewed and selected from 62 submissions.
These papers cover the following subjects: Artificial Intelligence for Cybersecurity, Machine Learning for Cybersecurity, and Mechanisms for Solving Actual Cybersecurity Problems (e.g., Blockchain, Attack and Defense; Encryptions with Cybersecurity Applications). 

Keywords

Science of Cyber Security Attacks Defenses Network Security Cyber Security Encryption Performance Enhancements Data Mining Data Security Data Mining Data Privacy Signal Processing Machine Learning

Editors and affiliations

  • Feng Liu
    • 1
  • Jia Xu
    • 2
  • Shouhuai Xu
    • 3
  • Moti Yung
    • 4
  1. 1.Institute of Information Engineering and School of CybersecurityUniversity of Chinese Academy of SciencesBeijingChina
  2. 2.Nanjing University of Posts and TelecommunicationsNanningChina
  3. 3.Department of Computer ScienceThe University of Texas at San AntonioSan AntonioUSA
  4. 4.Google and Columbia UniversityNew YorkUSA

Bibliographic information

Industry Sectors
Pharma
Automotive
Chemical Manufacturing
Biotechnology
IT & Software
Telecommunications
Consumer Packaged Goods
Engineering
Finance, Business & Banking
Electronics
Energy, Utilities & Environment
Aerospace