Book
Licensed
Unlicensed
Requires Authentication
Cybersecurity
Cyber Defense, Privacy and Cyber Warfare
-
Edited by:
George Dimitoglou
, Leonidas Deligiannidis and Hamid R. Arabnia
Language:
English
Published/Copyright:
2025
About this book
The depth of our dependence on technology in our interconnected world underscores the critical role of cyber security. This book provides essential insights into the latest research and best practices and techniques for protecting against cyber threats, emphasizing the critical relevance of cyber security in safeguarding personal information, businesses, and national security.
- Presents recent advances, research, and practices in cyber security in cyber defense, privacy, and cyber warfare.
- Includes novel approaches, issues, techniques, methodologies, infrastructures, and frameworks, along with real-world case studies.
Author / Editor information
G. Dimitoglou, Hood College; L. Deligiannidis, Wentworth Institute of Technology; H. Arabnia, University of Georgia, USA.
Topics
-
Download PDFPublicly Available
Frontmatter
I -
Download PDFRequires Authentication UnlicensedLicensed
Preface
V -
Download PDFPublicly Available
Contents
IX -
Download PDFRequires Authentication UnlicensedLicensed
List of contributing authors
XI -
Download PDFRequires Authentication UnlicensedLicensed
Game-based testing for active cyberdefense and cyberdeception
1 -
Download PDFRequires Authentication UnlicensedLicensed
Graph-ensemble methods for generating malware behavioral signatures
31 -
Download PDFRequires Authentication UnlicensedLicensed
Efficient cyber threat detection on SCADA systems using feature-grouped generative adversarial networks
57 -
Download PDFRequires Authentication UnlicensedLicensed
Applying artificial intelligence techniques to intrusion detection systems in serial-based industrial networks
71 -
Download PDFRequires Authentication UnlicensedLicensed
A hybrid intelligent intrusion detection system
91 -
Download PDFRequires Authentication UnlicensedLicensed
PwnPilot: could an adversary be pair programming with our most trusted software engineers?
109 -
Download PDFRequires Authentication UnlicensedLicensed
How to attack a far galaxy and beyond
145 -
Download PDFRequires Authentication UnlicensedLicensed
Injecting uniform chaotic sequences into an ANN’s learning fabric to reduce overfitting
179 -
Download PDFRequires Authentication UnlicensedLicensed
Effectiveness of machine learning and deep learning in cybersecurity
199 -
Download PDFRequires Authentication UnlicensedLicensed
Quantum-enhanced cyber threat detection with mini-batch optimization
215 -
Download PDFRequires Authentication UnlicensedLicensed
Future of auditable AI systems
231 -
Download PDFRequires Authentication UnlicensedLicensed
Virtual cybersecurity testbeds for industrial Internet of Things
255 -
Download PDFRequires Authentication UnlicensedLicensed
Security verification of authenticated encryption with associated data under chosen message attack assumption using Tamarin prover
281 -
Download PDFRequires Authentication UnlicensedLicensed
Security and privacy challenges in Internet of Medical Things (IoMT) using RFID and sensor nodes
319 -
Download PDFRequires Authentication UnlicensedLicensed
Empowering users with an effective tool for social media spam detection
333 -
Download PDFRequires Authentication UnlicensedLicensed
Comparative analysis of email digital forensics tools validation
355 -
Download PDFRequires Authentication UnlicensedLicensed
An implementation of a web platform for training in phishing attack detection using cognitive security, cognitive psychology, and game theory
383 -
Download PDFRequires Authentication UnlicensedLicensed
Index
411 -
Download PDFRequires Authentication UnlicensedLicensed
De Gruyter Series in Intelligent Computing
Publishing information
Pages and Images/Illustrations in book
eBook published on:
December 4, 2025
eBook ISBN:
9783111436548
Hardcover published on:
December 4, 2025
Hardcover ISBN:
9783111436418
Pages and Images/Illustrations in book
Front matter:
14
Main content:
414
Illustrations:
151
Coloured Illustrations:
128
Tables:
76
Audience(s) for this book
Libraries as well as researchers, graduate students and professionals interested in cybersecurity.
Safety & product resources
-
Manufacturer information:
Walter de Gruyter GmbH
Genthiner Straße 13
10785 Berlin
productsafety@degruyterbrill.com