Advances in Information Security

Mike Portnoy and Others
Series • 80 Books • Computers
Binary Code Fingerprinting for Cybersecurity Binary Code Fingerprinting for Cybersecurity
Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang & Aiman Hanna
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
Edward J. M. Colbert & Alexander Kott
Evolution of Cyber Technologies and Operations to 2035 Evolution of Cyber Technologies and Operations to 2035
Misty Blowers
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
Anne V. D. M. Kayem
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
Javier Hernández Fernández, Aymen Omri & Roberto Di Pietro
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
Ehsan Nowroozi, Kassem Kallas & Alireza Jolfaei
Blockchains Blockchains
Sushmita Ruj, Salil S. Kanhere & Mauro Conti
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
Wadii Boulila, Jawad Ahmad, Anis Koubâa, Maha Driss & Imed Riadh Farah
Security and Risk Analysis for Intelligent Edge Computing Security and Risk Analysis for Intelligent Edge Computing
Gautam Srivastava, Uttam Ghosh & Jerry Chun-Wei Lin
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
Alexander Kott