Message from EAI President regarding COVID-19
eScripts is currently undergoing an upgrade and heavy maintenance that may cause instability to the service and unsolicited emails going out to users in the upcoming few days. We apologize for any inconvenience that his may cause you and we appreciate your understanding as we continue to improve your experience.
If you encounter significant issues with eScripts, please let us know at

Cybersecurity Incident Planning and Preparation for Organizations

Editorial Board
Lead Guest Editors:
  • Akashdeep Bhardwaj (UPES Dehradun)+ BioCyber Security Operations Head and Researcher
Guest Editors:
  • Varun Sapra (UPES Dehradun)
Aims & Scope
This book provides use case scenarios of Machine Learning, Artificial Intelligence and real-time new age domain to supplement Cyber Security Operations and proactively predict attacks can preempt Cyber incidents. In order to prepare and respond, Cybersecurity Incident planning is highly essential. This starts from a draft response plan, assigning responsibilities, use of external experts, equip organization teams to address incidents, prepare communication strategy and cyber insurance. Incident plan involves classification and methods to detect the cybersecurity incidents and includes Incident Response Team, Situational Awareness, Containing and Eradicating incidents right until Cleanup and Recovery.
  • New Age Cybersecurity Attacks
  • Malware & Phishing
  • Cyber Physical Attacks
  • Cyber Safety Techniques
  • Network Security
  • Industrial Security
  • Blockchain Security
  • Incident Response
  • Use Cases
Cybersecurity Attacks, Phishing, Incident Response, Real Time Case Studies, Cyber physical systems, Cyber Safety Technologies, End User Systems, Handheld Security, Network Security, Datacenter & IT Infrastructure security, Database Security, Cloud Security, Securing IoT, Blockchain, Applications, Threat Surface Area and Landscape, Use of Big Data, Machine Learning, Artificial Intelligence to pre-empt Cyber Attacks, OSINT, Threat Hunting from Deep Web and Dark Web, Cyber Kill Chain, Monitoring, espionage and surveillance of unsecure Internet sources, Malware

Manuscript submission deadline:
Notification of acceptance:
Submission of final revised paper:
Publication of special issue (tentative):

EAISICC Book Series
Submission Closed