Springer, Advances in Information Security, Volume 70. — 2018. — 334 p.
Cyber Threat Intelligence: Challenges and Opportunities
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Datasets and Feature Selection Algorithms
Application of Machine Learning Techniques to Detecting Anomalies in Communication Networks: Classification Algorithms
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware
BoTShark: A Deep Learning Approach for Botnet Traffic Detection
A Practical Analysis of the Rise in Mobile Phishing
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence
A Model for Android and iOS Applications Risk Calculation: CVSS Analysis and Enhancement Using Case-Control Studies
A Honeypot Proxy Framework for Deceiving Attackers with Fabricated Content
Investigating the Possibility of Data Leakage in Time of Live VM Migration
Forensics Investigation of OpenFlow-Based SDN Platforms
Mobile Forensics: A Bibliometric Analysis
Emerging from the Cloud: A Bibliometric Analysis of Cloud Forensics Studies