1325 results in Communications, Information Theory and Security
Frontmatter
-
- Book:
- Fundamentals of MIMO Wireless Communications
- Published online:
- 23 July 2017
- Print publication:
- 17 April 2017, pp i-iv
-
- Chapter
- Export citation
Contents
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp v-vi
-
- Chapter
- Export citation
3 - Understanding Darkweb Malicious Hacker Forums
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 13-37
-
- Chapter
- Export citation
8 - Conclusion
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 118-122
-
- Chapter
- Export citation
Foreword
-
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp vii-viii
-
- Chapter
- Export citation
Preface
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp ix-x
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp i-iv
-
- Chapter
- Export citation
6 - Using Game Theory for Threat Intelligence
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 67-95
-
- Chapter
- Export citation
References
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 127-134
-
- Chapter
- Export citation
4 - Automatic Mining of Cyber Intelligence from the Darkweb
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 38-55
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 1-3
-
- Chapter
- Export citation
Index
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 135-137
-
- Chapter
- Export citation
5 - Analyzing Products and Vendors in Malicious Hacking Markets
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 56-66
-
- Chapter
- Export citation
7 - Application: Protecting Industrial Control Systems
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 96-117
-
- Chapter
- Export citation
Darkweb Cyber Threat Intelligence Mining
-
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017
2 - Moving to Proactive Cyber Threat Intelligence
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 4-12
-
- Chapter
- Export citation
Glossary
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp 123-126
-
- Chapter
- Export citation
4 - An Algebraic Method for Constructing QC-PTG-LDPC Codes and Code Ensembles
-
- Book:
- LDPC Code Designs, Constructions, and Unification
- Published online:
- 15 December 2016
- Print publication:
- 01 December 2016, pp 21-40
-
- Chapter
- Export citation
9 - SP-Construction of Spatially Coupled QC-LDPC Codes
-
- Book:
- LDPC Code Designs, Constructions, and Unification
- Published online:
- 15 December 2016
- Print publication:
- 01 December 2016, pp 111-137
-
- Chapter
- Export citation
Contents
-
- Book:
- LDPC Code Designs, Constructions, and Unification
- Published online:
- 15 December 2016
- Print publication:
- 01 December 2016, pp v-vii
-
- Chapter
- Export citation