Cyber-Security Threats, Actors, and Dynamic Mitigation  book cover
1st Edition

Cyber-Security Threats, Actors, and Dynamic Mitigation

  • Available for pre-order. Item will ship after April 5, 2021
ISBN 9780367433314
April 5, 2021 Forthcoming by CRC Press
392 Pages 127 B/W Illustrations

SAVE ~ $26.00
was $130.00
USD $104.00

Prices & shipping based on shipping country


Book Description

Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security. It covers the methodologies for modeling attack strategies used by threat actors targeting devices, systems, and networks such as smart homes, critical infrastructures, and industrial IoT.

With a comprehensive review of the threat landscape, the book explores both common and sophisticated threats to systems and networks. Tools and methodologies are presented for precise modeling of attack strategies, which can be used both proactively in risk management and reactively in intrusion prevention and response systems. Several contemporary techniques are offered ranging from reconnaissance and penetration testing to malware detection, analysis, and mitigation. Advanced machine learning-based approaches are also included in the area of anomaly-based detection, that are capable of detecting attacks relying on zero-day vulnerabilities and exploits.

Academics, researchers, and professionals in cyber-security who want an in-depth look at the contemporary aspects of the field will find this book of interest.  Those wanting a unique reference for various cyber-security threats and how they are detected, analyzed, and mitigated will reach for this book often.

Table of Contents

1. Introduction. 2. Cyber–Attackers’ Profiling. 3. Threat Catalogue. 4. Information Acquisition. 5. State of the Art in Malware Detection and Mitigation. 6. Graphical Security Models. 7. Attack Graph Generation. 8. Risk Management and Attack Mitigation. 9. Conclusions. 10. References.

View More



Nicholas Kolokotronis is an Associate Professor and head of the Cryptography and Security Group at the Department of Informatics and Telecommunications, University of the Peloponnese. He received his B.Sc. in mathematics from the Aristotle University of Thessaloniki, Greece, in 1995, an M.Sc. in highly efficient algorithms (highest honors) in 1998 and a Ph.D. in cryptography in 2003, both from the National and Kapodistrian University of Athens.

Since 2004, he has held visiting positions at the University of Piraeus, University of the Peloponnese, the National and Kapodistrian University of Athens, and the Open University of Cyprus. During 2002–04, he was with the European Dynamics S.A., Greece, as a security consultant. He has been a member of working groups for the provisioning of professional cyber–security training to large organizations, including the Hellenic Telecommunications and Posts Commission (EETT). He has published more than 85 papers in international scientific journals, conferences, and books and has participated in more than 20 EU–funded and national research and innovation projects. He has been a co–chair of conferences (IEEE CSR 2021), workshops (IEEE SecSoft 2019, IEEE CSRIoT 2019, 2020, and ACM EPESec 2020), and special sessions focusing on IoT security. Moreover, he has been a TPC member in many international conferences, incl. IEEE ISIT, IEEE GLOBECOM, IEEE ICC, ARES, and ISC.

He is currently a Guest Editor in "Engineering – cyber security, digital forensics and resilience" area of Springer’s Applied Sciences Journal (since 2019) and in the Reviewer Board of MDPI’s Cryptography journal (since 2020), whereas he has been an Associate Editor of the EURASIP Journal on Wireless Communications and Networking (2009–17) and a regular reviewer for a number of prestigious journals, incl. IEEE TIFS, IEEE TIT, Springer’s DCC, etc. His research interests span the broad areas of cryptography, security, and coding theory.

Stavros Shiaeles is an Assistant Professor in cyber-security at the University of Portsmouth, UK. He worked as an expert in cyber-security and digital forensics in the UK and EU, serving companies and research councils. His research interest span in the broad area of cyber-security and more specifically in OSINT, social engineering, distributed denial-of-service attacks, cloud security, digital forensics, network anomaly detection and malware mitigation. Dr. Shiaeles has authored more than 60 publications in academic journals and conference, co-chaired many workshops and conferences and actively involved in research projects as Principal Investigator leading his cyber-security research team.

Further to his academic qualifications, he holds a series of professional certifications, namely EC-Council Certified Ethical Hacker (CEH), EC-Council Advanced Penetration Testing (CAST611), ISACA Cobit 5 Foundation and a Cyberoam Certified Network and Security Professional (CCNSP), and he is EC-Council accredited instructor providing professional certifications training on cyber-security and penetration testing. He is also a Fellow of the BCS, Silver ISACA member, and a Fellow of the Higher Education Academy.

Prior entering academia, Dr. Shiaeles was in the industry, where he has more than 10 years of experience, and he has worked on various aspects of IT and cyber-security. He has a strong technical acuteness in programming (C, C#, Python, PHP, CSS, Bash, Sh and Bat scripting), in various operating systems (Unix, Linux and Windows), virtualization, VOIP, mail servers (Postfix, Qmail, Exchange), HTTP/S servers, Firewalls and NATs, IPS/IDS, PROXIES (such as Squid, Varnish), Penetration testing, Mikrotik RouterOS, CISCO routers configuration and applied cryptography.