Advances in Information Security

Mike Portnoy and Others
Series • 81 Books • Computers
Identifying Malicious Code Through Reverse Engineering Identifying Malicious Code Through Reverse Engineering
Abhishek Singh
Cyber-security of SCADA and Other Industrial Control Systems Cyber-security of SCADA and Other Industrial Control Systems
Edward J. M. Colbert & Alexander Kott
Security for Telecommunications Networks Security for Telecommunications Networks
Patrick Traynor, Patrick McDaniel & Thomas La Porta
Data Warehousing and Data Mining Techniques for Cyber Security Data Warehousing and Data Mining Techniques for Cyber Security
Anoop Singhal
Cyber Defense and Situational Awareness Cyber Defense and Situational Awareness
Alexander Kott, Cliff Wang & Robert F. Erbacher
Network Security Policies and Procedures Network Security Policies and Procedures
Douglas W. Frye
Autonomous Intelligent Cyber Defense Agent (AICA) Autonomous Intelligent Cyber Defense Agent (AICA)
Alexander Kott
Artificial Intelligence for Cybersecurity Artificial Intelligence for Cybersecurity
Mark Stamp, Corrado Aaron Visaggio, Francesco Mercaldo & Fabio Di Troia
Cyber Threat Intelligence Cyber Threat Intelligence
Ali Dehghantanha, Mauro Conti & Tooska Dargahi
Cyber Denial, Deception and Counter Deception Cyber Denial, Deception and Counter Deception
Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben Schmoker & Alexander W. Tsow