Listing 1 - 2 of 2 |
Sort by
|
Choose an application
As cyber threats become ever more frequent, a proactive defense that shifts attention from the defender to the attacker environment is key to designing better attack prediction systems. This book offers models to analyze threat intelligence mined from malicious hacker communities, providing insight into the heart of the underground cyber world.
Cyber intelligence (Computer security) --- Cyberterrorism --- Hacking --- Data mining. --- Social sciences --- Hackers --- Prevention. --- Network analysis. --- Social networks. --- Computer hackers --- Computer programmers --- Computer users --- Network analysis (Social sciences) --- SNA (Social network analysis) --- Social network analysis --- System analysis --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer hacking --- Computer programming --- Computer security --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Cyber spying --- Cyberintelligence (Computer security) --- Cyberspying --- Intelligence, Cyber (Computer security) --- Methodology
Choose an application
Cyber intelligence (Computer security). --- Cyberterrorism --- Data mining. --- Hackers --- Hacking --- Social sciences --- Prevention. --- Social networks. --- Network analysis.
Listing 1 - 2 of 2 |
Sort by
|