Cyber-security of SCADA and Other Industrial Control Systems
Edward J. M. Colbert & Alexander Kott
Identifying Malicious Code Through Reverse Engineering
Abhishek Singh
Cyber Denial, Deception and Counter Deception
Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker & Alexander W. Tsow
Insider Attack and Cyber Security
Salvatore J. Stolfo, Steven M. Bellovin, Shlomo Hershkop, Angelos D. Keromytis, Sara Sinclair & Sean W. Smith
Cybersecurity for Network and Information Security
Dietmar P. F. Möller
Enabling Privacy Preserving Data Analytics
Anne V. D. M. Kayem
Physical Layer Security in Power Line Communications
Javier Hernández Fernández, Aymen Omri & Roberto Di Pietro
Adversarial Multimedia Forensics
Ehsan Nowroozi, Kassem Kallas & Alireza Jolfaei
Blockchains
Sushmita Ruj, Salil S. Kanhere & Mauro Conti
Decision Making and Security Risk Management for IoT Environments
Wadii Boulila, Jawad Ahmad, Anis Koubâa, Maha Driss & Imed Riadh Farah