
About this book series
The series aims to develop and disseminate an understanding of innovations, paradigms, techniques, and technologies in the contexts of cyber security systems and networks related research and studies.
It publishes thorough and cohesive overviews of state-of-the-art topics in cyber security, as well as sophisticated techniques, original research presentations and in-depth case studies in cyber systems and networks. The series also provides a single point of coverage of advanced and timely emerging topics as well as a forum for core concepts that may not have reached a level of maturity to warrant a comprehensive textbook.
It addresses security, privacy, availability, and dependability issues for cyber systems and networks, and welcomes emerging technologies, such as artificial intelligence, cloud computing, cyber physical systems, and big data analytics related to cyber security research. The mainly focuses on the following research topics:
Fundamentals and theories
- Cryptography for cyber security
- Theories of cyber security
- Provable security
Cyber Systems and Networks
- Cyber systems security
- Network security
- Security services
- Social networks security and privacy
- Cyber attacks and defense
- Data-driven cyber security
- Trusted computing and systems
Applications and others
- Hardware and device security
- Cyber application security
- Human and social aspects of cyber security
- Electronic ISSN
- 2522-557X
- Print ISSN
- 2522-5561
- Editor-in-Chief
-
- Yang Xiang
- Series Editor
-
- Liqun Chen,
- Kim-Kwang Raymond Choo,
- Sherman S. M. Chow,
- Robert H. Deng,
- Dieter Gollmann,
- Kuan-Ching Li,
- Javier Lopez,
- Kui Ren,
- Jianying Zhou
Book titles in this series
-
-
Privacy-Preserving Deep Learning
A Comprehensive Survey
- Authors:
-
- Kwangjo Kim
- Harry Chandra Tanuwidjaja
- Copyright: 2021
- Published: 23 July 2021
-
Design and Cryptanalysis of ZUC
A Stream Cipher in Mobile Telephony
- Authors:
-
- Chandra Sekhar Mukherjee
- Dibyendu Roy
- Subhamoy Maitra
- Copyright: 2021
- Published: 28 January 2021
-
Cybersecurity in Digital Transformation
Scope and Applications
- Authors:
-
- Dietmar P.F. Möller
- Copyright: 2020
- Published: 04 December 2020
-
Network Intrusion Detection using Deep Learning
A Feature Learning Approach
- Authors:
-
- Kwangjo Kim
- Muhamad Erza Aminanto
- Harry Chandra Tanuwidjaja
- Copyright: 2018
- Published: 02 October 2018