You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book describes techniques and results in cyber threat intelligence from the center of the malicious hacking underworld - the dark web.
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book. Some of the important topics covered include: Research and solutions for the problem of hidd...
This book presents a collection of state-of-the-art AI approaches to cybersecurity and cyberthreat intelligence, offering strategic defense mechanisms for malware, addressing cybercrime, and assessing vulnerabilities to yield proactive rather than reactive countermeasures. The current variety and scope of cybersecurity threats far exceed the capabilities of even the most skilled security professionals. In addition, analyzing yesterday’s security incidents no longer enables experts to predict and prevent tomorrow’s attacks, which necessitates approaches that go far beyond identifying known threats. Nevertheless, there are promising avenues: complex behavior matching can isolate threats based on the actions taken, while machine learning can help detect anomalies, prevent malware infections, discover signs of illicit activities, and protect assets from hackers. In turn, knowledge representation enables automated reasoning over network data, helping achieve cybersituational awareness. Bringing together contributions by high-caliber experts, this book suggests new research directions in this critical and rapidly growing field.
This book examines cyberspace superiority in nation-state conflict from both a theoretical and a practical perspective. This volume analyses superiority concepts from the domains of land, maritime, and air to build a model that can be applied to cyberspace. Eight different cyberspace conflicts between nation states are examined and the resulting analysis is combined with theoretical concepts to present the reader with a conclusion. Case studies include the conflict between Russia and Estonia (2007), North Korea and the US and South Korea (2009) and Saudi Arabia and Iran in the Aramco attack (2012). The book uses these case studies to examine cyberspace superiority as an analytical framework ...
Cutting-edge models for proactive cybersecurity, applying AI, learning, and network analysis to information mined from hacker communities.
The practice of armed conflict has changed radically in the last decade. With eminent contributors from legal, government and military backgrounds, this Research Handbook addresses the legal implications of remote warfare and its significance for combatants, civilians, policymakers and international lawyers.
Military Strategy: A Very Short Introduction adapts Clausewitz's framework to highlight the dynamic relationship between the main elements of strategy: purpose, method, and means. Drawing on historical examples, Antulio J. Echevarria discusses the major types of military strategy and how emerging technologies are affecting them. This second edition has been updated to include an expanded chapter on manipulation through cyberwarfare and new further reading.
This enlightening book examines the use of online influence operations by foreign actors, and the extent to which these violate international law. It looks at key recent examples such as the 2016 UK EU Referendum, the 2016 American Presidential Election, and the 2017 French Presidential Election. The book analyses the core elements of interventions and sovereignty, and the extent to which these elements were violated in the three central case studies.
This book profiles 12 militant leaders responsible for violence in Indian-administered Kashmir to identify effective deradicalization and counterterrorist interventions for global impact. Building off decades of research in cultural psychiatry, political psychology, social psychology, and South Asian Studies, multilingual cultural psychiatrist and psychological researcher Neil Krishan Aggarwal develops a method for analyzing militant leaders by examining their personality traits, motivations, skills and abilities, and significant life events to ask what propels them into violence. He presents person-centered psychological case studies based on primary sources in Arabic, Hindi, Punjabi, and U...
This timely Research Handbook contains an analysis of various legal questions concerning cyberspace and cyber activities and provides a critical account of their effectiveness. Expert contributors examine the application of fundamental international la