default search action
Advances in Information Security
- 108Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro:
Physical Layer Security in Power Line Communications - Fundamentals, Models and Applications. Advances in Information Security 108, Springer 2024, ISBN 978-3-031-57348-4, pp. 1-126 - ...….
- 103Dietmar P. F. Möller:
Guide to Cybersecurity in Digital Transformation - Trends, Methods, Technologies, Applications and Best Practices. Advances in Information Security 103, Springer 2023, ISBN 978-3-031-26844-1, pp. 1-384 - ...….
- 101Reza Montasari:
Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Advances in Information Security 101, Springer 2023, ISBN 978-3-031-21919-1, pp. 1-164 - 100Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 [contents] - ...….
- 84Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci:
New Dimensions of Information Warfare. Advances in Information Security 84, Springer 2021, ISBN 978-3-030-60617-6, pp. 1-226 - 86ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198 - 85Matthew Ryan:
Ransomware Revolution: The Rise of a Prodigious Cyber Threat. Advances in Information Security 85, Springer 2021, ISBN 978-3-030-66582-1, pp. 1-156 - ...….
- 81Quanyan Zhu, Zhiheng Xu:
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach, 3. Advances in Information Security 81, Springer 2020, ISBN 978-3-030-60250-5, pp. 3-183 - 80Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt:
Multivariate Public Key Cryptosystems, Second Edition. Advances in Information Security 80, Springer 2020, ISBN 978-1-0716-0985-9, pp. 1-248 - 79Kim-Kwang Raymond Choo, Ali Dehghantanha, Reza M. Parizi:
Blockchain Cybersecurity, Trust and Privacy. Advances in Information Security 79, Springer 2020, ISBN 978-3-030-38180-6 [contents] - 78Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233 - 77Amos R. Omondi:
Cryptography Arithmetic - Algorithms and Hardware Architectures. Advances in Information Security 77, Springer 2020, ISBN 978-3-030-34141-1, pp. 3-313 - 76Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159 - ...….
- 73Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou:
Malicious Attack Propagation and Source Identification. Advances in Information Security 73, Springer 2019, ISBN 978-3-030-02178-8, pp. 1-181 - ...….
- 71Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Smart Micro-Grid Systems Security and Privacy. Advances in Information Security 71, Springer 2018, ISBN 978-3-319-91426-8 [contents] - ...….
- 69Tianqing Zhu, Gang Li, Wanlei Zhou, Philip S. Yu:
Differential Privacy and Applications. Advances in Information Security 69, Springer 2017, ISBN 978-3-319-62002-2, pp. 1-222 - 68Wen Ming Liu, Lingyu Wang:
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications. Advances in Information Security 68, Springer 2016, ISBN 978-3-319-42642-6, pp. 1-142 - 67Ehab Al-Shaer, Mohammad Ashiqur Rahman:
Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches. Advances in Information Security 67, Springer 2016, ISBN 978-3-319-32870-6, pp. 3-134 - ...….
- 65Mauro Conti:
Secure Wireless Sensor Networks - Threats and Solutions. Advances in Information Security 65, Springer 2015, ISBN 978-1-4939-3458-4, pp. 1-156 - 64Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben S. Schmoker, Alexander W. Tsow:
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense. Advances in Information Security 64, Springer 2015, ISBN 978-3-319-25131-8, pp. 1-174 - ...….
- 62Alexander Kott, Cliff Wang, Robert F. Erbacher:
Cyber Defense and Situational Awareness. Advances in Information Security 62, Springer 2014, ISBN 978-3-319-11390-6 [contents] - 61Robinson E. Pino, Alexander Kott, Michael J. Shevenell:
Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security 61, Springer 2014, ISBN 978-3-319-10373-0 [contents] - 60Angelo Genovese, Vincenzo Piuri, Fabio Scotti:
Touchless Palmprint Recognition Systems. Advances in Information Security 60, Springer 2014, ISBN 978-3-319-10364-8, pp. 1-203 - 59Christian Rathgeb, Andreas Uhl, Peter Wild:
Iris Biometrics - From Segmentation to Template Security. Advances in Information Security 59, Springer 2013, ISBN 978-1-4614-5570-7, pp. 3-316 - ...….
- 57Giovanni Livraga:
Protecting Privacy in Data Release. Advances in Information Security 57, Springer 2015, ISBN 978-3-319-16108-2, pp. 1-186 - 56Sushil Jajodia, Paulo Shakarian, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents] - 55Robinson E. Pino:
Network Science and Cybersecurity. Advances in Information Security 55, Springer 2014, ISBN 978-1-4614-7596-5 [contents] - 54Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2 [contents] - 53Charles A. Shoniregun, Kudakwashe Dube, Fredrick Mtenzi:
Electronic Healthcare Information Security. Advances in Information Security 53, Springer 2010, ISBN 978-0-387-84817-4, pp. 1-183 - 52Aggelos Kiayias, Serdar Pehlivanoglu:
Encryption for Digital Content. Advances in Information Security 52, Springer 2010, ISBN 978-1-4419-0043-2, pp. 1-197 - 51Sara Foresti:
Preserving Privacy in Data Outsourcing. Advances in Information Security 51, Springer 2011, ISBN 978-1-4419-7658-1, pp. 1-174 - 50John Aycock:
Spyware and Adware. Advances in Information Security 50, Springer 2011, ISBN 978-0-387-77740-5, pp. 1-128 - 49Christian W. Probst, Jeffrey Hunker, Dieter Gollmann, Matt Bishop:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 [contents] - 48Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin:
Adaptive Cryptographic Access Control. Advances in Information Security 48, Springer 2010, ISBN 978-0-387-77265-3, pp. 1-135 - 47Ali A. Ghorbani, Wei Lu, Mahbod Tavallaee:
Network Intrusion Detection and Prevention - Concepts and Techniques. Advances in Information Security 47, Springer 2010, ISBN 978-0-387-88770-8, pp. 1-198 - 46Sushil Jajodia, Peng Liu, Vipin Swarup, Cliff Wang:
Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2 [contents] - 45Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis:
Security and Dependability for Ambient Intelligence. Advances in Information Security 45, Springer 2009, ISBN 978-0-387-88774-6 [contents] - 44Abhishek Singh:
Identifying Malicious Code Through Reverse Engineering. Advances in Information Security 44, Springer 2009, ISBN 978-0-387-09824-1, pp. 1-42 - 43Jose Antonio Onieva, Javier López, Jianying Zhou:
Secure Multi-Party Non-Repudiation Protocols and Applications. Advances in Information Security 43, Springer 2009, ISBN 978-0-387-75629-5, pp. 1-47 - 42Michael Portnoy, Seymour E. Goodman:
Global Initiatives to Secure Cyberspace - An Emerging Landscape. Advances in Information Security 42, Springer 2009, ISBN 978-0-387-09763-3, pp. 1-32 - 41Kim-Kwang Raymond Choo:
Secure Key Establishment. Advances in Information Security 41, Springer 2009, ISBN 978-0-387-87968-0, pp. 1-210 - 40Patrick Traynor, Patrick D. McDaniel, Thomas La Porta:
Security for Telecommunications Networks. Advances in Information Security 40, Springer 2008, ISBN 978-0-387-72441-6, pp. 1-162 - 39Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents] - 38….
- 37Abhishek Singh, Baibhav Singh, Hirosh Joseph:
Vulnerability Analysis and Defense for the Internet. Advances in Information Security 37, Springer 2008, ISBN 978-0-387-74389-9, pp. 1-251 - 36Wenke Lee, Cliff Wang, David Dagon:
Botnet Detection: Countering the Largest Security Threat. Advances in Information Security 36, Springer 2008, ISBN 978-0-387-68768-1 [contents] - 35Ulrich Flegel:
Privacy-Respecting Intrusion Detection. Advances in Information Security 35, Springer 2007, ISBN 978-0-387-34346-4, pp. 1-307 - 34Charles A. Shoniregun:
Synchronizing Internet Protocol Security (SIPSec). Advances in Information Security 34, Springer 2007, ISBN 978-0-387-32724-2, pp. 1-218 - 33Ting Yu, Sushil Jajodia:
Secure Data Management in Decentralized Systems. Advances in Information Security 33, Springer 2007, ISBN 978-0-387-27694-6 [contents] - 32Douglas Frye:
Network Security Policies and Procedures. Advances in Information Security 32, Springer 2007, ISBN 978-0-387-30937-8 - 31Anoop Singhal:
Data Warehousing and Data Mining Techniques for Cyber Security. Advances in Information Security 31, Springer 2007, ISBN 978-0-387-26409-7, pp. 1-157 - 30Radha Poovendran, Sumit Roy, Cliff Wang:
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security 30, Springer 2007, ISBN 978-0-387-32721-1 [contents] - 29Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180 - 28Donggang Liu, Peng Ning:
Security for Wireless Sensor Networks. Advances in Information Security 28, Springer 2007, ISBN 978-0-387-32723-5, pp. 1-209 - 27Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang:
Malware Detection. Advances in Information Security 27, Springer 2007, ISBN 978-0-387-32720-4 [contents] - 26Gerrit Bleumer:
Electronic Postage Systems - Technology, Security, Economics. Advances in Information Security 26, Springer 2007, ISBN 978-0-387-29313-4, pp. 1-248 - 25Jintai Ding, Jason E. Gower, Dieter Schmidt:
Multivariate Public Key Cryptosystems. Advances in Information Security 25, Springer 2006, ISBN 978-0-387-32229-2, pp. 1-260 - 24Stefan Axelsson, David Sands:
Understanding Intrusion Detection Through Visualization. Advances in Information Security 24, Springer 2006, ISBN 978-0-387-27634-2, pp. 1-145 - 23Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin:
Quality of Protection - Security Measurements and Metrics. Advances in Information Security 23, Springer 2006, ISBN 978-0-387-29016-4 [contents] - 22John Aycock:
Computer Viruses and Malware. Advances in Information Security 22, Springer 2006, ISBN 978-0-387-30236-2, pp. 1-227 - 21Chin-Tser Huang, Mohamed G. Gouda:
Hop Integrity in the Internet. Advances in Information Security 21, Springer 2006, ISBN 978-0-387-24426-6, pp. 1-112 - 20Debra L. Cook, Angelos D. Keromytis:
CryptoGraphics - Exploiting Graphics Cards for Security. Advances in Information Security 20, Springer 2006, ISBN 978-0-387-29015-7, pp. 1-139 - 19Jaideep Vaidya, Yu Zhu, Christopher W. Clifton:
Privacy Preserving Data Mining. Advances in Information Security 19, Springer 2006, ISBN 978-0-387-25886-7, pp. 1-121 - 18Claus Vielhauer:
Biometric User Authentication for it Security - From Fundamentals to Handwriting. Advances in Information Security 18, Springer 2006, ISBN 978-0-387-26194-2, pp. 1-284 - 17Charles A. Shoniregun:
Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES). Advances in Information Security 17, Springer 2005, ISBN 978-0-387-24343-6, pp. 1-196 - 16Edgar R. Weippl:
Security in E-Learning. Advances in Information Security 16, Springer 2005, ISBN 978-0-387-24341-2, pp. 1-185 - 15Image and Video Encryption - From Digital Rights Management to Secured Personal Communication. Advances in Information Security 15, Springer 2005, ISBN 978-0-387-23402-1, pp. 1-161
- 14Christopher Kruegel, Fredrik Valeur, Giovanni Vigna:
Intrusion Detection and Correlation - Challenges and Solutions. Advances in Information Security 14, Springer 2005, ISBN 978-0-387-23398-7, pp. 1-118 - 13Tommy M. McGuire, Mohamed G. Gouda:
The Austin Protocol Compiler. Advances in Information Security 13, Springer 2005, ISBN 978-0-387-23227-0, pp. 1-132 - 12L. Jean Camp, Stephen Lewis:
Economics of Information Security. Advances in Information Security 12, Springer 2004, ISBN 1-4020-8089-1 [contents] - 11Song Y. Yan:
Primality Testing and Integer Factorization in Public-Key Cryptography. Advances in Information Security 11, Springer 2009, ISBN 978-0-387-77267-7, pp. 1-351 - 10Godfried Williams:
Synchronizing E-Security. Advances in Information Security 10, Springer 2003, pp. 1-88 - 9Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Advances in Information Security 9, Springer 2003, pp. 1-112 - 8Jun Li, Peter L. Reiher, Gerald J. Popek:
Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144 - 7Dimitris Gritzalis:
Secure Electronic Voting. Advances in Information Security 7, Springer 2003, ISBN 1-4020-7301-1 [contents] - 6….
- 5Zeliha Dilsun Kirli:
Mobile Computation with Functions. Advances in Information Security 5, Springer 2002, pp. 1-115 - 4….
- 3….
- 2Anup K. Ghosh:
E-Commerce Security and Privacy. Advances in Information Security 2, Springer 2001, ISBN 0-7923-7399-5 [contents] - 1….
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.