View All Book Series


Advances in Cybersecurity Management

About the Series

The critical technological transformations on which future prosperity depends, pervasive connectivity, artificial intelligence, quantum computing, and next-generation approaches to identity and access management will not only present additional challenges to the security community. They can generate new and systemic cyber risks to the global ecosystem, and their full impact is not well understood at this stage. It suggests the urgent need for collective action, policy intervention, and improved government and corporate accountability.

The scope of cybersecurity continues to evolve each year, as does the complexity of the business environment and the rapidly changing risk landscape in which it must operate.

This series is a fundamental source of reference for cybersecurity research and development. It aims to publish advanced textbooks, research monographs, and edited books addressing recent advances in cybersecurity topics. The series is a knowledge resource for practitioners, scientists, and researchers working in various fields of cybersecurity, hacking, digital forensics, cyber warfare, viruses and worms domain or critical infrastructure protection area.

4 Series Titles

Per Page

Security Engineering for Embedded and Cyber-Physical Systems

Security Engineering for Embedded and Cyber-Physical Systems

1st Edition

Edited By Saad Motahhir, Yassine Maleh
May 20, 2023

Digital transformation, also known as Industry 4.0, Smart Industry, and Smart Manufacturing, is at the top of leaders’ agendas. Such a transformation stimulates innovation in new products and services, the digital transformation of processes, and the creation of new business models and ecosystems. ...

Computational Intelligence for Cybersecurity Management and Applications

Computational Intelligence for Cybersecurity Management and Applications

1st Edition

Edited By Yassine Maleh, Mamoun Alazab, Soufyane Mounir
April 28, 2023

As cyberattacks continue to grow in complexity and number, computational intelligence is helping under-resourced security analysts stay one step ahead of threats. Drawing on threat intelligence from millions of studies, blogs, and news articles, computational intelligence techniques such as machine...

Internet of Things and Cyber Physical Systems Security and Forensics

Internet of Things and Cyber Physical Systems: Security and Forensics

1st Edition

Edited By Keshav Kaushik, Susheela Dahiya, Akashdeep Bhardwaj, Yassine Maleh
December 30, 2022

The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science. Such systems are becoming increasingly common in public locations, businesses, universities, residences, and other ...

IT Governance and Information Security Guides, Standards, and Frameworks

IT Governance and Information Security: Guides, Standards, and Frameworks

1st Edition

By Yassine Maleh, Abdelkebir Sahid, Mamoun Alazab, Mustapha Belaissaoui
December 21, 2021

IT governance seems to be one of the best strategies to optimize IT assets in an economic context dominated by information, innovation, and the race for performance. The multiplication of internal and external data and increased digital management, collaboration, and sharing platforms exposes ...

AJAX loader