Cyber-Security and Information Warfare

Nicholas J. Daras (Editor)
Dean of the Hellenic Military Academy

Series: Cybercrime and Cybersecurity Research
BISAC: COM060040




Digitally watermarked, DRM-free.
Immediate eBook download after purchase.

Product price
Additional options total:
Order total:



A variety of modern research methods in a number of innovating cyber-security techniques and information management technologies are provided in this book along with new related mathematical developments and support applications from engineering. This allows for the exploration of new approaches, useful practices and related problems for further investigation.

Distinguished researchers and scientists coming from different scientific origins present their research and views concerning cyber-security, information warfare and communications systems.

Graduate students, scientists and engineers interested in a broad spectrum of current theories, methods, and applications in interdisciplinary fields will find this book invaluable.

Topics covered include: Electronic crime and ethics in cyberspace, new technologies in security systems/systems interfaces, economic information warfare, digital security in the economy, human factor evaluation of military security systems, cyber warfare, military communications, operational analysis and information warfare, and engineering applications to security systems/detection theory.


Chapter 1. Sherlinux: A Tool Facilitating Linux Forensics
Antonios Andreatos, Div. of Computer Engineering & Information Science, Hellenic Air Force Academy, Dekeleia, Attica, Greece)

Chapter 2. Acoustic Scattering for a Piecewise Homogeneous Obstacle
(Christodoulos E. Athanasiadis and Evangelia. S. Athanasiadou, Christodoulos E. Athanasiadis and Evangelia. S. Athanasiadou, Department of Mathematics, National and Kapodistrian University of Athens, Panepistimiopolis, Athens, Greece)

Chapter 3. Economic Implications of the Rise of Information Warfare, Cyber-War and Cyber-Security
(Kyriaki Athanassouli, PhD, Department of Military Sciences, Hellenic Military Academy, Vari Attikis, Greece)

Chapter 4. Cyber Warfare: A beyond the Basics Approach
(Nikolaos Benias and Sozon A. Leventopoulos, 2nd Lt, Hellenic Armed Forces – Armor)

Chapter 5. Real-Time Computational Intelligence Protection Framework against Advanced Persistent Threats
(Konstantinos Demertzis and Lazaros Iliadis, Democritus University of Thrace, School of Engineering, Department of Civil Engineering, Faculty of Mathematics, Programming and General Subjects, Kimmeria, Xanthi, Greece)

Chapter 6. Computer Ethics and Institutions
(Maria Dimarogkona, Petros Stefaneas, Laboratory of Algorithmic Applications and Logic Department of Mathematics School of Applied Mathematical and Physical Sciences, Iroon Polytechniou 9 Polytechnioupoli, Zografou National Technical University of Athens (NTUA), Greece)

Chapter 7. Notes on the Estimation of the Asymptotics of the Moments for the m Collector’s Problem
(Aristides V. Doumas, Department of Mathematics, National Technical University of Athens,
Zografou Campus, Athens, Greece)

Chapter 8. The Use of Millimeter and Sub-Millimeter Wave Frequencies in Future Military Applications
(M. Gargalakos, I. Karanasiou, R. Makri and N. K. Uzunoglu, Department of Mathematics and Engineering Sciences, Hellenic Military Academy, Kitsi, Greece, and others)

Chapter 9. On the Mechanics of Nanocomposite Structures Using Multiscale Computational Techniques
(Stylianos K. Georgantzinos, Mechanics Lab, Division of Mathematics and Engineering Studies, Department of Military Science, Hellenic Army Academy, Vari, Greece, and others)

Chapter 10. Operational Analysis & Crisis Management (OACM) Framework: The Paradigm of 2011 Military Intervention in Libya
(Dionysios Gerontogiannis, PhD, Former Commandant of Hellenic Infantry School,
Adjunct Professor of Module: “Operational Analysis and Crisis Management,” Applied Operational Research and Analysis, Interdepartmental Postgraduate Programme, Hellenic Army Academy and University of Crete, Hellas, Greece)

Chapter 11. Artificial Intelligence in Cyber Defense
(Georgios Karapilafis, Military Academy of Euelpidon, Technical University of Crete, Thessaloniki, Greece)

Chapter 12. A Case Study Analysis of Attacks and Losses in the Supply Chain with the Use of GPS or GSM Jammers by the Attackers
(Panayiotis Laimos, Michalis Chronopoulos, Chrysanthi Laimou and Nikoleta Atanasova)

Chapter 13. Dynamic Response of Protein Microtubules
(A. K. Lazopoulos, PhD, Department of Mathematical Sciences and Mechanics, Hellenic Military Academy, Vari, Greece)

Chapter 14. Time Temperature Superposition Response of Carbon Fiber Reinforced Composite Plaques under Accelerated Aging Conditions
(Dionysios E. Mouzakis and Stefanos P. Zaoutsos, Hellenic Army Academy, Department of Military Sciences, Sector of Mathematics and Engineering Applications, Applied Mechanics Laboratory, Vari, Greece, and others)

Chapter 15. Attacks against Information Systems in the E.U. Environment: Legal Texts and the Joint Cybercrime Action Taskforce (J-Cat) Model
(Anastasios Papathanasiou and Georgios Germanos, Hellenic Police, Cyber Crime Division, Athens, Greece)

Chapter 16. The Military Applications of Printed Flexible Electronics
(Fotios Pelesis, PhD, Technipetrol Hellas S. A. (TechnipFMC Group), Athens, Greece)

Chapter 17. The Computational Simulation of Passive Synchronization Method for Frequency Hopping Systems
(K. A. Psilopanagiotis and P. E. Atlamazoglou PhD, Hellenic Army General Staff, Athens, Greece

Chapter 18. Economics, Financial Warfare and Economic Espionage: From Total War to Modernity. An Analysis of Selected Case Studies
(Ioannis-Dionysios Salavrakos, Visiting Professor, University of Athens, Department of Turkish and Modern Asian Studies, Athens, Greece, and others)

Chapter 19. Ethics in Cyberspace: Cyber-Security
(Stamatia Sofiou, Associate Professor, Hellenic Military Academy, Vari, Greece, and others)

Chapter 20. Bivariate Copulas-Based Models for Communication Networks
(Ioannis S. Triantafyllou, Department of Computer Science and Biomedical Informatics, University of Thessaly, Volos, Greece)

Chapter 21. Redesigning the Flood Training Unit of the Hellenic Navy: Principles and Aspects of Human Centered Design
(G.V. Lykos, N. P. Ventikos, A. K. Rammos, V. G. Petropoulos, Damage Control School, T.C. Palaskas, Naval Training Command, Hellenic Navy, and others)

Chapter 22. An Automated Procedure for the Utilization of Hellenic Army’s Empty Warehouses
(Theodoros Zikos, Dimitrios Zaires and Nikolaos V. Karadimas, Colonel, Hellenic Army General Staff, Athens, Greece)


“The book is devoted to a broad spectrum of methods and techniques of an interdisciplinary nature, where both Mathematics and Engineering play a significant role. More specifically, this volume presents up-to-date advances in cyber-security, information management technologies, along with mathematical and engineering applications. Eminent experts in the individual subjects have presented very important works which can prove very essential for future research. The book appeals to a wide readership, from graduate students to research scientists who seek the latest information. It would also serve as a very valuable reference source for libraries of universities, research institutes, as well as individual collections. I believe this publication contributes very much to the existing literature in Science and Technology and will serve as a source of inspiration and guidance for further study in the corresponding areas of research.” - Themistocles M. Rassias, Professor at the National Technical University of Athens, Greece

Keywords: Electronic Crime, Ethics and Risk Management in Cyberspace, Economic Information Warfare, New Technologies in Security Systems, Military Communications, Cyber Warfare, Military Information Support Operations, Cyber Security, Engineering Applications to Security Systems, City Risks and Privacy

Audience: It will be particularly useful to graduate students, scientists and engineers, who wish to be introduced to a wide spectrum of relevant theories, methods and applications leading to a global interdisciplinary research in Cryptology and Information Warfare.

If you have any questions or comments with regards to this book, please fill out the form below. Thank you!

You have not viewed any product yet.