© 2015

Cyber Warfare

Building the Scientific Foundation

  • Sushil Jajodia
  • Paulo Shakarian
  • V.S. Subrahmanian
  • Vipin Swarup
  • Cliff Wang
  • Describes the latest research on the attribution problem to help identify culprits of cyber attacks

  • The editors are renowned leaders in the field of cyber security and present novel approaches to critical problems

  • Highlights the complex and multi-faceted aspects of cyber warfare


Part of the Advances in Information Security book series (ADIS, volume 56)

Table of contents

  1. Front Matter
    Pages i-xiii
  2. Robert J. Elder, Alexander H. Levis, Bahram Yousefi
    Pages 15-35
  3. Patrick Sweeney, George Cybenko
    Pages 37-56
  4. Christopher Kiekintveld, Viliam Lisý, Radek Píbil
    Pages 81-101
  5. Kristin E. Heckman, Frank J. Stech
    Pages 103-140
  6. Samuel N. Hamilton
    Pages 141-149
  7. Paulo Shakarian, Gerardo I. Simari, Geoffrey Moores, Simon Parsons
    Pages 151-171
  8. Julie L. Marble, W. F. Lawless, Ranjeev Mittu, Joseph Coyne, Myriam Abramson, Ciara Sibley
    Pages 173-206
  9. Noam Ben-Asher, Cleotilde Gonzalez
    Pages 207-220
  10. Napoleon C. Paxton, Stephen Russell, Ira S. Moskowitz, Paul Hyden
    Pages 237-263
  11. B. Aditya Prakash
    Pages 287-306

About this book


This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph theory and more. The high-level approach and emphasis on scientific rigor provides insights on ways to improve cyber warfare defense worldwide. Cyber Warfare: Building the Scientific Foundation targets researchers and practitioners working in cyber security, especially government employees or contractors. Advanced-level students in computer science and electrical engineering with an interest in security will also find this content valuable as a secondary textbook or reference.


Argumentation based approach Automated adversary profiling Botnets Cyber attacks Cyber attribution Cyber counterdeception Cyber warfare Cybersecurity Game theory Malware Network security Risk assessment

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Paulo Shakarian
    • 2
  • V.S. Subrahmanian
    • 3
  • Vipin Swarup
    • 4
  • Cliff Wang
    • 5
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Arizona State UniversityTempeUSA
  3. 3.Computer Science DepartmentUniversity of MarylandCollege ParkUSA
  4. 4.The MITRE CorporationMcLeanUSA
  5. 5.Information Sciences DirectorateTriangle ParkUSA

Bibliographic information


“This collection of basic research is designed for advanced students and practitioners. … As is typical of the Springer series, the information is quite current and advanced. Each chapter is a standalone paper with its own list of references at the end … . the book is one to include on your reference shelf.” (Brad Reid, Computing Reviews, July 2015)