About this book series
This series changed its name, please follow this link: https://www.springer.com/series/17133 to get on the series with the updated name.
It publishes thorough and cohesive overviews of state-of-the-art topics in cyber security, as well as sophisticated techniques, original research presentations and in-depth case studies in cyber systems and networks. The series also provides a single point of coverage of advanced and timely emerging topics as well as a forum for core concepts that may not have reached a level of maturity to warrant a comprehensive textbook.
It addresses security, privacy, availability, and dependability issues for cyber systems and networks, and welcomes emerging technologies, such as artificial intelligence, cloud computing, cyber physical systems, and big data analytics related to cyber security research. The mainly focuses on the following research topics:
Fundamentals and theories
- Cryptography for cyber security
- Theories of cyber security
- Provable security
Cyber Systems and Networks
- Cyber systems security
- Network security
- Security services
- Social networks security and privacy
- Cyber attacks and defense
- Data-driven cyber security
- Trusted computing and systems
Applications and others
- Hardware and device security
- Cyber application security
- Human and social aspects of cyber security
Discontinued series: although this series no longer publishes new content, the published titles listed here remain available.
- Electronic ISSN
- 2522-557X
- Print ISSN
- 2522-5561
- Editor-in-Chief
-
- Yang Xiang
- Series Editor
-
- Liqun Chen,
- Kim-Kwang Raymond Choo,
- Sherman S. M. Chow,
- Robert H. Deng,
- Dieter Gollmann,
- Kuan-Ching Li,
- Javier Lopez,
- Kui Ren,
- Jianying Zhou
Book titles in this series
-
-
Privacy-Preserving Deep Learning
A Comprehensive Survey
- Authors:
-
- Kwangjo Kim
- Harry Chandra Tanuwidjaja
- Copyright: 2021
Available Renditions
- Soft cover
- eBook
-
Design and Cryptanalysis of ZUC
A Stream Cipher in Mobile Telephony
- Authors:
-
- Chandra Sekhar Mukherjee
- Dibyendu Roy
- Subhamoy Maitra
- Copyright: 2021
Available Renditions
- Soft cover
- eBook
-
Cybersecurity in Digital Transformation
Scope and Applications
- Authors:
-
- Dietmar P.F. Möller
- Copyright: 2020
Available Renditions
- Soft cover
- eBook
-
Network Intrusion Detection using Deep Learning
A Feature Learning Approach
- Authors:
-
- Kwangjo Kim
- Muhamad Erza Aminanto
- Harry Chandra Tanuwidjaja
- Copyright: 2018
Available Renditions
- Soft cover
- eBook