Cyber Security Cryptography and Machine Learning

Second International Symposium, CSCML 2018, Beer Sheva, Israel, June 21–22, 2018, Proceedings

  • Itai Dinur
  • Shlomi Dolev
  • Sachin Lodha
Conference proceedings CSCML 2018

Part of the Lecture Notes in Computer Science book series (LNCS, volume 10879)

Also part of the Security and Cryptology book sub series (LNSC, volume 10879)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Tomer Yeminy, Eyal Wohlgemuth, Dan Sadot, Zeev Zalevsky
    Pages 1-5
  3. Orr Dunkelman, Ariel Weizman
    Pages 6-19
  4. Daniel M. Bittner, Anand D. Sarwate, Rebecca N. Wright
    Pages 20-37
  5. Trishita Tiwari, David Starobinski, Ari Trachtenberg
    Pages 38-54
  6. Shlomi Dolev, Chryssis Georgiou, Ioannis Marcoullis, Elad M. Schiller
    Pages 84-100
  7. Ioannis Chatzigiannakis, Vasiliki Liagkou, Paul G. Spirakis
    Pages 101-104
  8. Philip Derbeko, Shlomi Dolev, Ehud Gudes
    Pages 105-119
  9. Alejandro Cohen, Asaf Cohen, Omer Gurewitz
    Pages 129-143
  10. Zara Perumal, Kalyan Veeramachaneni
    Pages 144-161
  11. Ivan De Oliveira Nunes, Karim Eldefrawy, Tancrède Lepoint
    Pages 162-180
  12. Mai Ben Adar Bessos, Amir Herzberg
    Pages 188-205
  13. Jesus Diaz, Seung Geol Choi, David Arroyo, Angelos D. Keromytis, Francisco B. Rodriguez, Moti Yung
    Pages 206-226
  14. Shay Nachum, Assaf Schuster, Opher Etzion
    Pages 227-242
  15. Alexandre Cukier, Ronen I. Brafman, Yotam Perkal, David Tolpin
    Pages 243-254
  16. Ziv Aharoni, Gal Rattner, Haim Permuter
    Pages 274-277
  17. Moran Azran, Niv Ben Shabat, Tal Shkolnik, Yossi Oren
    Pages 283-286
  18. Back Matter
    Pages 287-287

About these proceedings


This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.

The 16 full and 6 short papers presented in this volume were carefully reviewed and selected from 44 submissions. They deal with the theory, design, analysis, implementation, or application of cyber security, cryptography and machine learning systems and networks, and conceptually innovative topics in the scope.


anomaly detection artificial intelligence authentication computer crime computer operating systems data mining data security image processing internet machine learning malware privacy preserving wireless telecommunication systems world wide web cryptography network security security protocols Web protocol security operating system security mobile and wireless security

Editors and affiliations

  • Itai Dinur
    • 1
  • Shlomi Dolev
    • 2
  • Sachin Lodha
    • 3
  1. 1.Ben-Gurion University of the NegevBeer ShevaIsrael
  2. 2.Ben-Gurion University of the NegevBeer ShevaIsrael
  3. 3.Tata Consultancy Services (India)ChennaiIndia

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing AG, part of Springer Nature 2018
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-319-94146-2
  • Online ISBN 978-3-319-94147-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment