Today, when a security incident happens, the top three questions a cyber operation center would a...
This SpringerBrief explores graphical password systems and examines novel drawing-based methods i...
This is the first book on digital fingerprinting that comprehensively covers the major areas of s...
Botnets have become the platform of choice for launching attacks and committing fraud on the I...
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastruct...
Today's cyber defenses are largely static allowing adversaries to pre-plan their attacks. In resp...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless...
This book introduces recent research results for cyber deception, a promising field for proactive...
This book discusses and summarizes current research issues, identifies challenges, and outlines f...
This book explores fundamental scientific problems essential for autonomous cyber defense. Specif...
After September 11th, the Department of Defense (DoD) undertook a massive and classified research...