After September 11th, the Department of Defense (DoD) undertook a massive and classified research...
Botnets have become the platform of choice for launching attacks and committing fraud on the I...
Shared resources, such as the Internet, have created a highly interconnected cyber-infrastruct...
Motivation for the Book This book seeks to establish the state of the art in the cyber situationa...
Our cyber defenses are static and are governed by lengthy processes, e.g., for testing and securi...
This book presents a range of cloud computing security challenges and promising solution paths. T...
This book provides the foundations for understanding hardware security and trust. Coverage includ...
Localization is a critical process in mobile ad hoc networks and wireless sensor networks. Wir...
This book features a wide spectrum of the latest computer science research relating to cyber warf...
Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group...
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless...
This edited volume features a wide spectrum of the latest computer science research relating to c...