


default search action
Advances in Information Security
108Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro:
Physical Layer Security in Power Line Communications - Fundamentals, Models and Applications. Advances in Information Security 108, Springer 2024, ISBN 978-3-031-57348-4, pp. 1-126
...….
103Dietmar P. F. Möller:
Guide to Cybersecurity in Digital Transformation - Trends, Methods, Technologies, Applications and Best Practices. Advances in Information Security 103, Springer 2023, ISBN 978-3-031-26844-1, pp. 1-384
...….
101Reza Montasari:
Countering Cyberterrorism - The Confluence of Artificial Intelligence, Cyber Forensics and Digital Policing in US and UK National Cybersecurity. Advances in Information Security 101, Springer 2023, ISBN 978-3-031-21919-1, pp. 1-164
100Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1 [contents]
...….
92Anne V. D. M. Kayem:
Enabling Privacy Preserving Data Analytics, 3. Advances in Information Security 92, Springer 2026, ISBN 978-3-031-93905-1, pp. 3-168
...….
84Roberto Di Pietro
, Simone Raponi, Maurantonio Caprolu, Stefano Cresci:
New Dimensions of Information Warfare. Advances in Information Security 84, Springer 2021, ISBN 978-3-030-60617-6, pp. 1-226
86ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Android Malware Detection using Machine Learning - Data-Driven Fingerprinting and Threat Intelligence. Advances in Information Security 86, Springer 2021, ISBN 978-3-030-74663-6, pp. 1-198
85Matthew Ryan
:
Ransomware Revolution: The Rise of a Prodigious Cyber Threat. Advances in Information Security 85, Springer 2021, ISBN 978-3-030-66582-1, pp. 1-156
...….
81Quanyan Zhu, Zhiheng Xu:
Cross-Layer Design for Secure and Resilient Cyber-Physical Systems - A Decision and Game Theoretic Approach, 3. Advances in Information Security 81, Springer 2020, ISBN 978-3-030-60250-5, pp. 3-183
80Jintai Ding
, Albrecht Petzoldt, Dieter S. Schmidt:
Multivariate Public Key Cryptosystems, Second Edition. Advances in Information Security 80, Springer 2020, ISBN 978-1-0716-0985-9, pp. 1-248
79Kim-Kwang Raymond Choo
, Ali Dehghantanha, Reza M. Parizi
:
Blockchain Cybersecurity, Trust and Privacy. Advances in Information Security 79, Springer 2020, ISBN 978-3-030-38180-6 [contents]
78Saed Alrabaee, Mourad Debbabi, Paria Shirani, Lingyu Wang, Amr M. Youssef, Ashkan Rahimian, Lina Nouh, Djedjiga Mouheb, He Huang, Aiman Hanna:
Binary Code Fingerprinting for Cybersecurity - Application to Malicious Code Fingerprinting. Advances in Information Security 78, Springer 2020, ISBN 978-3-030-34237-1, pp. 1-233
77Amos R. Omondi:
Cryptography Arithmetic - Algorithms and Hardware Architectures. Advances in Information Security 77, Springer 2020, ISBN 978-3-030-34141-1, pp. 3-313
76Suryadipta Majumdar, Taous Madi, Yushun Wang, Azadeh Tabiban, Momen Oqaily, Amir Alimohammadifar, Yosr Jarraya, Makan Pourzandi, Lingyu Wang
, Mourad Debbabi:
Cloud Security Auditing. Advances in Information Security 76, Springer 2019, ISBN 978-3-030-23127-9, pp. 1-159
...….
73Jiaojiao Jiang, Sheng Wen, Shui Yu
, Bo Liu
, Yang Xiang, Wanlei Zhou:
Malicious Attack Propagation and Source Identification. Advances in Information Security 73, Springer 2019, ISBN 978-3-030-02178-8, pp. 1-181
...….
71Anne V. D. M. Kayem, Stephen D. Wolthusen, Christoph Meinel:
Smart Micro-Grid Systems Security and Privacy. Advances in Information Security 71, Springer 2018, ISBN 978-3-319-91426-8 [contents]
...….
69Tianqing Zhu, Gang Li
, Wanlei Zhou, Philip S. Yu:
Differential Privacy and Applications. Advances in Information Security 69, Springer 2017, ISBN 978-3-319-62002-2, pp. 1-222
68Wen Ming Liu, Lingyu Wang:
Preserving Privacy Against Side-Channel Leaks - From Data Publishing to Web Applications. Advances in Information Security 68, Springer 2016, ISBN 978-3-319-42642-6, pp. 1-142
67Ehab Al-Shaer, Mohammad Ashiqur Rahman
:
Security and Resiliency Analytics for Smart Grids - Static and Dynamic Approaches. Advances in Information Security 67, Springer 2016, ISBN 978-3-319-32870-6, pp. 3-134
...….
65Mauro Conti
:
Secure Wireless Sensor Networks - Threats and Solutions. Advances in Information Security 65, Springer 2015, ISBN 978-1-4939-3458-4, pp. 1-156
64Kristin E. Heckman, Frank J. Stech, Roshan K. Thomas, Ben S. Schmoker, Alexander W. Tsow:
Cyber Denial, Deception and Counter Deception - A Framework for Supporting Active Cyber Defense. Advances in Information Security 64, Springer 2015, ISBN 978-3-319-25131-8, pp. 1-174
...….
62Alexander Kott, Cliff Wang, Robert F. Erbacher:
Cyber Defense and Situational Awareness. Advances in Information Security 62, Springer 2014, ISBN 978-3-319-11390-6 [contents]
61Robinson E. Pino, Alexander Kott, Michael J. Shevenell:
Cybersecurity Systems for Human Cognition Augmentation. Advances in Information Security 61, Springer 2014, ISBN 978-3-319-10373-0 [contents]
60Angelo Genovese
, Vincenzo Piuri, Fabio Scotti
:
Touchless Palmprint Recognition Systems. Advances in Information Security 60, Springer 2014, ISBN 978-3-319-10364-8, pp. 1-203
59Christian Rathgeb, Andreas Uhl
, Peter Wild:
Iris Biometrics - From Segmentation to Template Security. Advances in Information Security 59, Springer 2013, ISBN 978-1-4614-5570-7, pp. 3-316
...….
57Giovanni Livraga
:
Protecting Privacy in Data Release. Advances in Information Security 57, Springer 2015, ISBN 978-3-319-16108-2, pp. 1-186
56Sushil Jajodia, Paulo Shakarian
, V. S. Subrahmanian, Vipin Swarup, Cliff Wang:
Cyber Warfare - Building the Scientific Foundation. Advances in Information Security 56, Springer 2015, ISBN 978-3-319-14038-4 [contents]
55Robinson E. Pino:
Network Science and Cybersecurity. Advances in Information Security 55, Springer 2014, ISBN 978-1-4614-7596-5 [contents]
54Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang:
Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2 [contents]
53Charles A. Shoniregun, Kudakwashe Dube
, Fredrick Mtenzi
:
Electronic Healthcare Information Security. Advances in Information Security 53, Springer 2010, ISBN 978-0-387-84817-4, pp. 1-183
52Aggelos Kiayias, Serdar Pehlivanoglu:
Encryption for Digital Content. Advances in Information Security 52, Springer 2010, ISBN 978-1-4419-0043-2, pp. 1-197
51Sara Foresti
:
Preserving Privacy in Data Outsourcing. Advances in Information Security 51, Springer 2011, ISBN 978-1-4419-7658-1, pp. 1-174
50John Aycock:
Spyware and Adware. Advances in Information Security 50, Springer 2011, ISBN 978-0-387-77740-5, pp. 1-128
49Christian W. Probst
, Jeffrey Hunker, Dieter Gollmann, Matt Bishop
:
Insider Threats in Cyber Security. Advances in Information Security 49, Springer 2010, ISBN 978-1-4419-7132-6 [contents]
48Anne V. D. M. Kayem, Selim G. Akl, Patrick Martin:
Adaptive Cryptographic Access Control. Advances in Information Security 48, Springer 2010, ISBN 978-0-387-77265-3, pp. 1-135
47Ali A. Ghorbani, Wei Lu
, Mahbod Tavallaee:
Network Intrusion Detection and Prevention - Concepts and Techniques. Advances in Information Security 47, Springer 2010, ISBN 978-0-387-88770-8, pp. 1-198
46Sushil Jajodia
, Peng Liu, Vipin Swarup, Cliff Wang:
Cyber Situational Awareness - Issues and Research. Advances in Information Security 46, Springer 2010, ISBN 978-1-4419-0139-2 [contents]
45Spyros Kokolakis, Antonio Maña Gómez
, George Spanoudakis:
Security and Dependability for Ambient Intelligence. Advances in Information Security 45, Springer 2009, ISBN 978-0-387-88774-6 [contents]
44Abhishek Singh:
Identifying Malicious Code Through Reverse Engineering. Advances in Information Security 44, Springer 2009, ISBN 978-0-387-09824-1, pp. 1-42
43Jose Antonio Onieva
, Javier López, Jianying Zhou:
Secure Multi-Party Non-Repudiation Protocols and Applications. Advances in Information Security 43, Springer 2009, ISBN 978-0-387-75629-5, pp. 1-47
42Michael Portnoy, Seymour E. Goodman:
Global Initiatives to Secure Cyberspace - An Emerging Landscape. Advances in Information Security 42, Springer 2009, ISBN 978-0-387-09763-3, pp. 1-32
41Kim-Kwang Raymond Choo:
Secure Key Establishment. Advances in Information Security 41, Springer 2009, ISBN 978-0-387-87968-0, pp. 1-210
40Patrick Traynor, Patrick D. McDaniel, Thomas La Porta:
Security for Telecommunications Networks. Advances in Information Security 40, Springer 2008, ISBN 978-0-387-72441-6, pp. 1-162
39Salvatore J. Stolfo, Steven M. Bellovin, Angelos D. Keromytis, Shlomo Hershkop, Sean W. Smith, Sara Sinclair:
Insider Attack and Cyber Security - Beyond the Hacker. Advances in Information Security 39, Springer 2008, ISBN 978-0-387-77321-6 [contents]
38….
37Abhishek Singh, Baibhav Singh, Hirosh Joseph:
Vulnerability Analysis and Defense for the Internet. Advances in Information Security 37, Springer 2008, ISBN 978-0-387-74389-9, pp. 1-251
36Wenke Lee, Cliff Wang, David Dagon:
Botnet Detection: Countering the Largest Security Threat. Advances in Information Security 36, Springer 2008, ISBN 978-0-387-68768-1 [contents]
35Ulrich Flegel:
Privacy-Respecting Intrusion Detection. Advances in Information Security 35, Springer 2007, ISBN 978-0-387-34346-4, pp. 1-307
34Charles A. Shoniregun:
Synchronizing Internet Protocol Security (SIPSec). Advances in Information Security 34, Springer 2007, ISBN 978-0-387-32724-2, pp. 1-218
33Ting Yu, Sushil Jajodia:
Secure Data Management in Decentralized Systems. Advances in Information Security 33, Springer 2007, ISBN 978-0-387-27694-6 [contents]
32Douglas Frye:
Network Security Policies and Procedures. Advances in Information Security 32, Springer 2007, ISBN 978-0-387-30937-8
31Anoop Singhal:
Data Warehousing and Data Mining Techniques for Cyber Security. Advances in Information Security 31, Springer 2007, ISBN 978-0-387-26409-7, pp. 1-157
30Radha Poovendran, Sumit Roy, Cliff Wang:
Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks. Advances in Information Security 30, Springer 2007, ISBN 978-0-387-32721-1 [contents]
29Lingyu Wang, Sushil Jajodia, Duminda Wijesekera:
Preserving Privacy in On-Line Analytical Processing (OLAP). Advances in Information Security 29, Springer 2007, ISBN 978-0-387-46273-8, pp. 1-180
28Donggang Liu, Peng Ning:
Security for Wireless Sensor Networks. Advances in Information Security 28, Springer 2007, ISBN 978-0-387-32723-5, pp. 1-209
27Mihai Christodorescu, Somesh Jha, Douglas Maughan, Dawn Song, Cliff Wang:
Malware Detection. Advances in Information Security 27, Springer 2007, ISBN 978-0-387-32720-4 [contents]
26Gerrit Bleumer:
Electronic Postage Systems - Technology, Security, Economics. Advances in Information Security 26, Springer 2007, ISBN 978-0-387-29313-4, pp. 1-248
25Jintai Ding, Jason E. Gower, Dieter Schmidt:
Multivariate Public Key Cryptosystems. Advances in Information Security 25, Springer 2006, ISBN 978-0-387-32229-2, pp. 1-260
24Stefan Axelsson, David Sands:
Understanding Intrusion Detection Through Visualization. Advances in Information Security 24, Springer 2006, ISBN 978-0-387-27634-2, pp. 1-145
23Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin
:
Quality of Protection - Security Measurements and Metrics. Advances in Information Security 23, Springer 2006, ISBN 978-0-387-29016-4 [contents]
22John Aycock:
Computer Viruses and Malware. Advances in Information Security 22, Springer 2006, ISBN 978-0-387-30236-2, pp. 1-227
21Chin-Tser Huang, Mohamed G. Gouda:
Hop Integrity in the Internet. Advances in Information Security 21, Springer 2006, ISBN 978-0-387-24426-6, pp. 1-112
20Debra L. Cook, Angelos D. Keromytis:
CryptoGraphics - Exploiting Graphics Cards for Security. Advances in Information Security 20, Springer 2006, ISBN 978-0-387-29015-7, pp. 1-139
19Jaideep Vaidya, Yu Zhu, Christopher W. Clifton:
Privacy Preserving Data Mining. Advances in Information Security 19, Springer 2006, ISBN 978-0-387-25886-7, pp. 1-121
18Claus Vielhauer:
Biometric User Authentication for it Security - From Fundamentals to Handwriting. Advances in Information Security 18, Springer 2006, ISBN 978-0-387-26194-2, pp. 1-284
17Charles A. Shoniregun:
Impacts and Risk Assessment of Technology for Internet Security - Enabled Information Small-Medium Enterprises (TEISMES). Advances in Information Security 17, Springer 2005, ISBN 978-0-387-24343-6, pp. 1-196
16Edgar R. Weippl:
Security in E-Learning. Advances in Information Security 16, Springer 2005, ISBN 978-0-387-24341-2, pp. 1-185
15Image and Video Encryption - From Digital Rights Management to Secured Personal Communication. Advances in Information Security 15, Springer 2005, ISBN 978-0-387-23402-1, pp. 1-161
14Christopher Kruegel, Fredrik Valeur, Giovanni Vigna:
Intrusion Detection and Correlation - Challenges and Solutions. Advances in Information Security 14, Springer 2005, ISBN 978-0-387-23398-7, pp. 1-118
13Tommy M. McGuire, Mohamed G. Gouda:
The Austin Protocol Compiler. Advances in Information Security 13, Springer 2005, ISBN 978-0-387-23227-0, pp. 1-132
12L. Jean Camp, Stephen Lewis:
Economics of Information Security. Advances in Information Security 12, Springer 2004, ISBN 1-4020-8089-1 [contents]
11Song Y. Yan:
Primality Testing and Integer Factorization in Public-Key Cryptography. Advances in Information Security 11, Springer 2009, ISBN 978-0-387-77267-7, pp. 1-351
10Godfried Williams:
Synchronizing E-Security. Advances in Information Security 10, Springer 2003, pp. 1-88
9Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang:
Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Advances in Information Security 9, Springer 2003, pp. 1-112
8Jun Li, Peter L. Reiher, Gerald J. Popek:
Disseminating Security Updates at Internet Scale. Advances in Information Security 8, Springer 2002, pp. 1-144
7Dimitris Gritzalis:
Secure Electronic Voting. Advances in Information Security 7, Springer 2003, ISBN 1-4020-7301-1 [contents]
6….
5Zeliha Dilsun Kirli:
Mobile Computation with Functions. Advances in Information Security 5, Springer 2002, pp. 1-115
4….
3….
2Anup K. Ghosh:
E-Commerce Security and Privacy. Advances in Information Security 2, Springer 2001, ISBN 0-7923-7399-5 [contents]
1….

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














