Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Frontmatter 1. Cyber War Games: Strategic Jostling Among Traditional Adversaries 2. Alternatives to Cyber Warfare: Deterrence and Assurance 3. Identifying and Exploiting the Cyber High Ground for Botnets 4. Attribution, Temptation, and Expectation: A Formal Framework for Defense-by-Deception in Cyberwarfare 5. Game-Theoretic Foundations for the Strategic Use of Honeypots in Network Security 6. Cyber Counterdeception: How to Detect Denial & Deception (D&D) 7. Automated Adversary Profiling 8. Cyber Attribution: An Argumentation-Based Approach 9. The Human Factor in Cybersecurity: Robust & Intelligent Defense 10. CyberWar Game: A Paradigm for Understanding New Challenges of Cyber War 11. Active Discovery of Hidden Profiles in Social Networks Using Malware 12. A Survey of Community Detection Algorithms Based On Analysis-Intent 13. Understanding the Vulnerability Lifecycle for Risk Assessment and Defense Against Sophisticated Cyber Attacks 14. Graph Mining for Cyber Security 15. Programming Language Theoretic Security in the Real World: A Mirage or the Future?
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion