Book contents
- Frontmatter
- Contents
- Foreword
- Preface
- 1 Introduction
- 2 Moving to Proactive Cyber Threat Intelligence
- 3 Understanding Darkweb Malicious Hacker Forums
- 4 Automatic Mining of Cyber Intelligence from the Darkweb
- 5 Analyzing Products and Vendors in Malicious Hacking Markets
- 6 Using Game Theory for Threat Intelligence
- 7 Application: Protecting Industrial Control Systems
- 8 Conclusion
- Glossary
- References
- Index
Contents
Published online by Cambridge University Press: 06 April 2017
- Frontmatter
- Contents
- Foreword
- Preface
- 1 Introduction
- 2 Moving to Proactive Cyber Threat Intelligence
- 3 Understanding Darkweb Malicious Hacker Forums
- 4 Automatic Mining of Cyber Intelligence from the Darkweb
- 5 Analyzing Products and Vendors in Malicious Hacking Markets
- 6 Using Game Theory for Threat Intelligence
- 7 Application: Protecting Industrial Control Systems
- 8 Conclusion
- Glossary
- References
- Index
Summary
![Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'](https://static.cambridge.org/content/id/urn%3Acambridge.org%3Aid%3Abook%3A9781316888513/resource/name/firstPage-9781316888513toc_pv-vi_CBO.jpg)
- Type
- Chapter
- Information
- Darkweb Cyber Threat Intelligence Mining , pp. v - viPublisher: Cambridge University PressPrint publication year: 2017