Cyber Security, Cryptology, and Machine Learning
7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings
Article
Identifying traffic platoons and managing vehicles on the road effectively is a challenging task that is currently under investigation both in academia and the industry. The challenges include the need for fas...
Chapter and Conference Paper
The world of maritime transport is a significant part of the global economy. Traffic control relies, among other means, on the Automatic Identification System (AIS) device, which reports dynamic and fixed data...
Book and Conference Proceedings
7th International Symposium, CSCML 2023, Be'er Sheva, Israel, June 29–30, 2023, Proceedings
Chapter and Conference Paper
Open addressing hash tables, possibly under double hashing policy, are regarded more memory efficient than linked list hashing; as the memory used for pointers can be used for a longer table, and allow better-...
Chapter and Conference Paper
Fake news propagation is a major challenge for Online Social Networks (OSN) security, which is not yet resolved. Fake news propagates because of several reasons, one of which is non-trustworthy users. Non-trus...
Chapter and Conference Paper
Emergency situations involve massive movements of (logistic and units) platoons to and from focal locations. Platoons may move in different directions and can be blocking each other in junctions causing even d...
Chapter and Conference Paper
The GDPR (General Data Protection Regulation) is a regulation for data protection and privacy for citizens of the EU. It also addresses the export of personal data outside the EU, thus creating a regulation t...
Chapter and Conference Paper
This paper proposes a novel method for using a PoW-based Blockchain to ensure data integrity in cloud database management systems. The use of cloud platforms for storing data or even hosting databases is incre...
Chapter and Conference Paper
Security and privacy have been major concerns of Online Social Networks (OSN). Individual users as well as organizations utilize OSNs, such as Facebook, Twitter, and LinkedIn, to share information with other u...
Article
The privacy-preserving data release is an increasingly important problem in today’s computing. As the end devices collect more and more data, reducing the amount of published data saves considerable network, C...
Chapter and Conference Paper
In this paper, we propose an attribute-based access control model called ABAC–TG for online social networks (OSNs). This model comprehensively considers user and object attributes and two main social attribute...
Chapter and Conference Paper
Online Social Networks (OSN) security issues have been extensively r...
Chapter and Conference Paper
Many applications, such as download managers, antivirus, backup utilities, and Web browsers, are distributed freely via popular download sites in an attempt to increase the application’s user base. When such a...
Chapter and Conference Paper
The Domain Name System (DNS) is an essential component of the internet infrastructure, used to translates domain names into IP addresses. Threat actors often abuse this system by registering and taking over th...
Chapter and Conference Paper
Over the last decade Online Social Networks (OSN) privacy has been thoroughly studied in many aspects. Some of these privacy related aspects are trust and credibility involving the OSN user-data conveyed by di...
Chapter and Conference Paper
The amount of data grows exponentially with time and the growth shows no signs of stop**. However, the data in itself is not useful until it can be processed, mined for information and queried. Thus, data sh...
Chapter and Conference Paper
During the past decade Online Social Networks (OSN) privacy has been thoroughly studied in many aspects. Some of these privacy related aspects are trust and credibility involving the OSN user-data conveyed by ...
Chapter and Conference Paper
During the last couple of years there have been many researches on Online Social Networks (OSN). The common manner of representing an OSN is by a user-based graph, where the vertices are different OSN users, a...
Chapter and Conference Paper
Data integrity in cloud databases is a topic that has received a much of attention from the research community. However, existing solutions mainly focus on the cloud providers that store data in relational dat...
Chapter and Conference Paper
Despite its attractiveness, Big Data oftentimes is hard, slow and expensive to handle due to its size. Moreover, as the amount of collected data grows, individual privacy raises more and more concerns: “what d...