John Robertson is a student at Arizona State University pursuing undergraduate degrees in both Computer Science and Electrical Engineering, where his work was nominated for the Computing Research Association's Outstanding Undergraduate Researcher award. He is a recipient of an ARO Undergraduate Research Apprenticeship Program grant as well as two Fulton Undergraduate Research Initiative grants for his work involving the application of artificial intelligence techniques to cyber-security problems in the Cyber-Socio Intelligent System Laboratory with Dr Paulo Shakarian. Robertson also has industry experience as a software engineering intern with Microsoft on the Windows Core Development team.
Inhaltsangabe
1. Introduction 2. Moving to proactive cyber threat intelligence 3. Understanding darkweb malicious hacker forums 4. Automatic mining of cyber intelligence from the dark web 5. Analyzing products and vendors in malicious hacking markets 6. Using game theory for threat intelligence 7. Application - protecting industrial control systems 8. Conclusion - the future of darkweb cyber threat intelligence.
1. Introduction 2. Moving to proactive cyber threat intelligence 3. Understanding darkweb malicious hacker forums 4. Automatic mining of cyber intelligence from the dark web 5. Analyzing products and vendors in malicious hacking markets 6. Using game theory for threat intelligence 7. Application - protecting industrial control systems 8. Conclusion - the future of darkweb cyber threat intelligence.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309