3 works on record
Malware detection
Information Systems Security
Analysis Techniques for Information Security