34 results
Preface
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp xi-xii
-
- Chapter
- Export citation
Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 15-16
-
- Chapter
- Export citation
9 - Finding At-Risk Systems without Software Vulnerability Identifiers (CVEs)
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 163-182
-
- Chapter
- Export citation
Frontmatter
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp i-iv
-
- Chapter
- Export citation
4 - Reasoning about Hacker Engagement
- from Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 43-59
-
- Chapter
- Export citation
10 - Final Considerations
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 183-188
-
- Chapter
- Export citation
5 - Uncovering Communities of Malware and Exploit Vendors
- from Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 60-74
-
- Chapter
- Export citation
1 - Introduction
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 1-5
-
- Chapter
-
- You have access
- Export citation
Foreword
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp ix-x
-
- Chapter
- Export citation
3 - Mining Key-hackers
- from Part I - Understanding the Behavior of Malicious Hackers
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 17-42
-
- Chapter
- Export citation
References
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 189-202
-
- Chapter
- Export citation
2 - Background
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 6-14
-
- Chapter
- Export citation
Index
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 203-212
-
- Chapter
- Export citation
8 - Bringing Social Network Analysis to Aid in Cyber-attack Prediction
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 127-162
-
- Chapter
- Export citation
6 - Identifying Exploits in theWild Proactively
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 77-107
-
- Chapter
- Export citation
7 - Predicting Enterprise-Targeted External Cyber-attacks
- from Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 108-126
-
- Chapter
- Export citation
Contents
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp v-viii
-
- Chapter
- Export citation
Part II - Predicting Imminent Cyber-Threats
-
- Book:
- Exploring Malicious Hacker Communities
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021, pp 75-76
-
- Chapter
- Export citation
Exploring Malicious Hacker Communities
- Toward Proactive Cyber-Defense
-
- Published online:
- 09 April 2021
- Print publication:
- 29 April 2021
Contents
-
- Book:
- Darkweb Cyber Threat Intelligence Mining
- Published online:
- 06 April 2017
- Print publication:
- 04 April 2017, pp v-vi
-
- Chapter
- Export citation