Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Frontmatter
1. Cyber War Games: Strategic Jostling Among Traditional Adversaries
2. Alternatives to Cyber Warfare: Deterrence and Assurance
3. Identifying and Exploiting the Cyber High Ground for Botnets
4. Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare
5. Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security
6. Cyber Counterdeception: How to Detect Denial & Deception (D&D)
7. Automated Adversary Profiling
8. Cyber Attribution: An Argumentation-Based Approach
9. The Human Factor in Cybersecurity: Robust & Intelligent Defense
10. CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War
11. Active Discovery of Hidden Profiles in Social Networks Using Malware
12. A Survey of Community Detection Algorithms Based On Analysis-Intent
13. Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks
14. Graph Mining for Cyber Security
15. Programming Language Theoretic Security in the Real World: A Mirage or the Future?
← Prev
Back
Next →
← Prev
Back
Next →