Linked e-resources
Details
Table of Contents
Jamming Strategies in Covert Communication / Ori Shmuel, Asaf Cohen, Omer Gurewitz
Linear Cryptanalysis Reduced Round of Piccolo-80
Tomer Ashur, Orr Dunkelman, Nael Masalha
Continuous Key Agreement with Reduced Bandwidth / Nir Drucker, Shay Gueron
Covert Channel Cyber-Attack over Video Stream DCT Payload / Yoram Segal, Ofer Hadar
Effects of Weather on Drone to IoT QKD / Shlomi Arnon, Judy Kupferman
Malware Classification Using Image Representation / Ajay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla
MLDStore / Philip Derbeko, Shlomi Dolev, Ehud Gudes
Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement)
Elisabeth Drayer, Tirza Routtenberg
Beyond Replications in Blockchain / Shlomi Dolev, Yuval Poleg
Self-stabilizing Byzantine Consensus for Blockchain / Alexander Binun, Shlomi Dolev, Tal Hadad
The Advantage of Truncated Permutations / Shoni Gilboa, Shay Gueron
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution / Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu
Generating a Random String with a Fixed Weight / Nir Drucker, Shay Gueron
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes
Enhancing Image Steganalysis with Adversarially Generated Examples / Kevin Alex Zhang, Kalyan Veeramachaneni
Controllable Privacy Preserving Blockchain / Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba
A Relay Attack on a Tamper Detection System (Brief Announcement)
Itai Dinur, Natan Elul
Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement)
Ron Shoham, Haim Permuter
Governance and Regulations Implications on Machine Learning (Brief Announcement)
Sima Nadler, Orna Raz, Marcel Zalmanovici
Simulating Homomorphic Evaluation of Deep Learning Predictions / Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Everything Is in the Name - A URL Based Approach for Phishing Detection / Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha
Network Cloudification / Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin
New Goal Recognition Algorithms Using Attack Graphs / Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner
PeerClear: Peer-to-Peer Bot-net Detection / Amit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla
Rethinking Identification Protocols from the Point of View of the GDPR / Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen
Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement)
Meir Kalech, Amit Shlomo, Robert Moskovich
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)
Vasiliki Liagkou, Paul Spirakis, Yannis C. Stamatiou.
Linear Cryptanalysis Reduced Round of Piccolo-80
Tomer Ashur, Orr Dunkelman, Nael Masalha
Continuous Key Agreement with Reduced Bandwidth / Nir Drucker, Shay Gueron
Covert Channel Cyber-Attack over Video Stream DCT Payload / Yoram Segal, Ofer Hadar
Effects of Weather on Drone to IoT QKD / Shlomi Arnon, Judy Kupferman
Malware Classification Using Image Representation / Ajay Singh, Anand Handa, Nitesh Kumar, Sandeep Kumar Shukla
MLDStore / Philip Derbeko, Shlomi Dolev, Ehud Gudes
Cyber Attack Localization in Smart Grids by Graph Modulation (Brief Announcement)
Elisabeth Drayer, Tirza Routtenberg
Beyond Replications in Blockchain / Shlomi Dolev, Yuval Poleg
Self-stabilizing Byzantine Consensus for Blockchain / Alexander Binun, Shlomi Dolev, Tal Hadad
The Advantage of Truncated Permutations / Shoni Gilboa, Shay Gueron
Reconstructing C2 Servers for Remote Access Trojans with Symbolic Execution / Luca Borzacchiello, Emilio Coppa, Daniele Cono D'Elia, Camil Demetrescu
Generating a Random String with a Fixed Weight / Nir Drucker, Shay Gueron
An Access Control Model for Data Security in Online Social Networks Based on Role and User Credibility / Nadav Voloch, Priel Levy, Mor Elmakies, Ehud Gudes
Enhancing Image Steganalysis with Adversarially Generated Examples / Kevin Alex Zhang, Kalyan Veeramachaneni
Controllable Privacy Preserving Blockchain / Rami Puzis, Guy Barshap, Polina Zilberman, Oded Leiba
A Relay Attack on a Tamper Detection System (Brief Announcement)
Itai Dinur, Natan Elul
Amended Cross-Entropy Cost: An Approach for Encouraging Diversity in Classification Ensemble (Brief Announcement)
Ron Shoham, Haim Permuter
Governance and Regulations Implications on Machine Learning (Brief Announcement)
Sima Nadler, Orna Raz, Marcel Zalmanovici
Simulating Homomorphic Evaluation of Deep Learning Predictions / Christina Boura, Nicolas Gama, Mariya Georgieva, Dimitar Jetchev
Everything Is in the Name - A URL Based Approach for Phishing Detection / Harshal Tupsamudre, Ajeet Kumar Singh, Sachin Lodha
Network Cloudification / Yefim Dinitz, Shlomi Dolev, Sergey Frenkel, Alex Binun, Daniel Khankin
New Goal Recognition Algorithms Using Attack Graphs / Reuth Mirsky, Ya'ar Shalom, Ahmad Majadly, Kobi Gal, Rami Puzis, Ariel Felner
PeerClear: Peer-to-Peer Bot-net Detection / Amit Kumar, Nitesh Kumar, Anand Handa, Sandeep Kumar Shukla
Rethinking Identification Protocols from the Point of View of the GDPR / Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen
Temporal Pattern-Based Malicious Activity Detection in SCADA Systems (Brief Announcement)
Meir Kalech, Amit Shlomo, Robert Moskovich
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
Randomized and Set-System Based Collusion Resistant Key Predistribution Schemes (Brief Announcement)
Vasiliki Liagkou, Paul Spirakis, Yannis C. Stamatiou.