Skip to main content

Cyber Malware

Offensive and Defensive Systems

  • Book
  • © 2024

Overview

  • Presents theoretical, technical, and practical knowledge on defending against malware attacks
  • Covers malware applications using machine learning algorithms, Blockchain and AI, forensics tools, and much more
  • Includes perspectives from experts in cybersecurity at different institutions, including academia

Part of the book series: Security Informatics and Law Enforcement (SILE)

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.

Similar content being viewed by others

Keywords

Table of contents (9 chapters)

Reviews

“The book makes a substantial addition to the body of knowledge on cybersecurity. It is a must-read for anyone wanting a deeper understanding of the intricacies of cyber malware, due to its thorough coverage of both offensive and defensive techniques, expert analysis, and useful examples. Whether you are a student, researcher, or cybersecurity expert, this book will help you better understand the constantly changing world of cyber threats and how to deal with them.” (Mihailescu Marius Iulian, Computing Reviews, February 21, 2024)

Editors and Affiliations

  • Security Engineering Lab, Prince Sultan University, Riyadh, Saudi Arabia

    Iman Almomani

  • School of Computing, Edinburgh Napier University, Edinburgh, UK

    Leandros A. Maglaras

  • AI and Digital Science Research Center, Technology Innovation Institute, Masdar City, United Arab Emirates

    Mohamed Amine Ferrag

  • School of Computer Science and Informatics, De Montfort University, Leicester, UK

    Nick Ayres

About the editors

Dr. Iman Almomani received the bachelor’s degree from United Arab Emirates, in 2000, the master’s degree in computer science from Jordan, in 2002, and the Ph.D. degree in wireless network security from De Montfort University, U.K., in 2007. She is currently an Associate Professor in cybersecurity. She is also the Associate Director of the Research and Initiatives Centre (RIC) & the Innovation Center (IC) and also the Leader of the Security Engineering Laboratory (SEL) at Prince Sultan University (PSU), Riyadh, Saudi Arabia. Before Joining Prince Sultan University, she has worked as an Associate Professor and the Head of the Computer Science Department, The University of Jordan, Jordan. Her research interests include wireless networks and security, mainly wireless mobile ad hoc networks (WMANETs), wireless sensor networks (WSNs), multimedia networking (VoIP), and Internet of Things (IoT) security. She is also interested in in mobile operating systems security, including Android security. Iman has a wide experience in terms of applied research and product development in the area of cybersecurity maturity models and Assessment and Compliance Tools. She has several publications in the above areas in a number of reputable international and local journals and conferences. She is also a Senior Member of IEEE WIE. She is on the organizing and technical committees of a number of local and international conferences. She also serves as a reviewer and a member of the editorial board for a number of international journals.

Dr. Leandros A. Maglaras is a professor of cybersecurity in the School of Computing at Edinburgh Napier University. From September 2017 to November 2019, he was the Director of the National Cyber Security Authority of Greece. He obtained a B.Sc. (M.Sc. equivalent) in Electrical and Computer Engineering from the Aristotle University of Thessaloniki, Greece in 1998, M.Sc. in Industrial Production and Management from the University of Thessaly in 2004,and M.Sc. and Ph.D. degrees in Electrical & Computer Engineering from the University of Thessaly, in 2008 and 2014 respectively. In 2018 he was awarded a Ph.D. in Intrusion Detection in SCADA systems from the University of Huddersfield He is featured in Stanford University's list of the world’s Top 2% scientists. He is a Senior Member of the Institute of Electrical & Electronics Engineers (IEEE) and is an author of more than 200 papers in scientific magazines and conferences

Dr. Mohamed Amine Ferrag received the Bachelor’s, Master’s, Ph.D., and Habilitation degrees in computer science from Badji Mokhtar—Annaba University, Annaba, Algeria, in June, 2008, June, 2010, June, 2014, and April, 2019, respectively. From 2014 to 2022, he was an Associate Professor with the Department of Computer Science, Guelma University, Algeria. From 2019 to 2022, he was a Visiting Senior Researcher with the NAU-Lincoln Joint Research Center of Intelligent Engineering, Nanjing Agricultural University, China. Since 2022, he has been the Led Researcher with Artificial Intelligence & Digital Science Research Center, Technology Innovation Institute, Abu Dhabi, United Arab Emirates. His research interests include wireless network security, network coding security, applied cryptography, blockchain technology, and AI for cyber security. He has published over 100 papers in international journals and conferences in the above areas. He has been conducting several research projects with international collaborations on these topics. He was a recipient of the 2021 IEEE TEM Best Paper Award as well as the 2022 Scopus Algeria Award. He is featured in Stanford University’s list of the world’s Top 2% scientists for the years 2020, 2021, and 2022. He is a Senior Member of the Institute of Electrical & Electronic Engineers (IEEE) and a member of the Association for Computing Machinery (ACM).

 Dr. Nick Ayres received the Bachelor's degree (July, 1996) in Engineering Information Technology, Master's degree (June, 2013) in Cyber Security, Ph.D. degree (March, 2021) in Computer Science from De Montfort University, United Kingdom. He is a lecturer in Cyber Security specializing in incident response, social engineering and cyberterrorism. His current research interests include over the air automotive software updates and the impact of risk compensation. He has authored a number of publications concerning cyberterrorism as well as other topics including susceptibility to phishing utilizing fuzzy logic as well as several publications regarding automotive technology.


Bibliographic Information

  • Book Title: Cyber Malware

  • Book Subtitle: Offensive and Defensive Systems

  • Editors: Iman Almomani, Leandros A. Maglaras, Mohamed Amine Ferrag, Nick Ayres

  • Series Title: Security Informatics and Law Enforcement

  • DOI: https://doi.org/10.1007/978-3-031-34969-0

  • Publisher: Springer Cham

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2024

  • Hardcover ISBN: 978-3-031-34968-3Published: 09 November 2023

  • Softcover ISBN: 978-3-031-34971-3Due: 10 December 2023

  • eBook ISBN: 978-3-031-34969-0Published: 08 November 2023

  • Series ISSN: 2523-8507

  • Series E-ISSN: 2523-8515

  • Edition Number: 1

  • Number of Pages: XXXVI, 280

  • Number of Illustrations: 1 b/w illustrations

  • Topics: Communications Engineering, Networks, Cybercrime, Systems and Data Security, Security Science and Technology

Publish with us