Highlights current cyber and electronic security challenges as well as research gaps and opportunities
Reports on recent advances in applications and techniques in cyber and electronic security and intelligence
Presents the latest theoretical cyber and electronic security advancesIncludes a tutorial chapter on Shellshock usage and mitigation