Exploring malicious hacker communities toward proactive cyber-defence
Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack predictio...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , , , , , |
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Cambridge, United Kingdom, New York, NY, USA, Port Melbourne, VIC, Australia, New Delhi, India, Singapore
Cambridge University Press
2021
|
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis Klappentext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations. |
---|---|
Beschreibung: | xii, 211 Seiten Illustrationen, Diagramme |
ISBN: | 9781108491594 978-1-108-49159-4 9781108869003 |