Identifying Malicious Code Through Reverse Engineering
Abhishek Singh
Cyber-security of SCADA and Other Industrial Control Systems
Edward J. M. Colbert & Alexander Kott
Security for Telecommunications Networks
Patrick Traynor, Patrick McDaniel & Thomas La Porta
Data Warehousing and Data Mining Techniques for Cyber Security
Anoop Singhal
Cyber Defense and Situational Awareness
Alexander Kott, Cliff Wang & Robert F. Erbacher
Network Security Policies and Procedures
Douglas W. Frye
Autonomous Intelligent Cyber Defense Agent (AICA)
Alexander Kott
Artificial Intelligence for Cybersecurity
Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo & Fabio Di Troia
Cyber Threat Intelligence
Ali Dehghantanha, Mauro Conti & Tooska Dargahi
Cyber Denial, Deception and Counter Deception
Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker & Alexander W. Tsow