Advances in Information Security

Mike Portnoy and Others
Series • 82 Books • Computers
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
Edward J. M. Colbert & Alexander Kott
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
Abhishek Singh
Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker & Alexander W. Tsow
Insider Attack and Cyber Security Insider Attack and Cyber Security
Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair & Sean W. Smith
Cybersecurity for Network and Information Security Cybersecurity for Network and Information Security
Dietmar P. F. Möller
Enabling Privacy Preserving Data Analytics Enabling Privacy Preserving Data Analytics
Anne V. D. M. Kayem
Physical Layer Security in Power Line Communications Physical Layer Security in Power Line Communications
Javier Hernández Fernández, Aymen Omri & Roberto Di Pietro
Adversarial Multimedia Forensics Adversarial Multimedia Forensics
Ehsan Nowroozi, Kassem Kallas & Alireza Jolfaei
Blockchains Blockchains
Sushmita Ruj, Salil S. Kanhere & Mauro Conti
Decision Making and Security Risk Management for IoT Environments Decision Making and Security Risk Management for IoT Environments
Wadii Boulila, Jawad Ahmad, Anis Koubâa, Maha Driss & Imed Riadh Farah