Foreword Edward G. Amoroso; Preface; 1. Introduction; 2. Background; Part I. Understanding the Behavior of Malicious Hackers: 3. Mining key-hackers; 4. Reasoning about hacker engagement; 5. Uncovering communities of malware and exploit vendors; Part II. Predicting Imminent Cyber Threats: 6. Identifying exploits in the wild proactively; 7. Predicting enterprise-targeted external cyber-attacks; 8. Bringing social network analysis to aid in cyber-attack prediction; 9. Finding at-risk systems without software vulnerability identifiers (CVE's); 10. Final considerations.
Cutting-edge models for proactive cybersecurity, applying AI, learning, and network analysis to information mined from hacker communities.
![]() |
Ask a Question About this Product More... |
![]() |