Exploring malicious hacker communities: toward proactive cyber-defence
Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack predictio...
Authors: | ; ; ; ; ; |
---|---|
Contributors: | |
Format: | Electronic Book |
Language: | English |
Published: |
Cambridge, United Kingdom New York, NY, USA Port Melbourne, VIC, Australia New Delhi, India Singapore
Cambridge University Press
2021
|
In: | Year: 2021 |
Online Access: |
Volltext (lizenzpflichtig) Volltext (lizenzpflichtig) |
Check availability: | HBZ Gateway |
Subito Delivery Service: | Order now. |
Keywords: | |
Related Items: | Erscheint auch als:
1744461880 |
MARC
LEADER | 00000cam a2200000 4500 | ||
---|---|---|---|
001 | 1757952500 | ||
003 | DE-627 | ||
005 | 20240202212902.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210517s2021 xxk|||||o 00| ||eng c | ||
020 | |a 9781108869003 |9 978-1-108-86900-3 | ||
024 | 7 | |a 10.1017/9781108869003 |2 doi | |
035 | |a (DE-627)1757952500 | ||
035 | |a (DE-599)KXP1757952500 | ||
035 | |a (OCoLC)1250640735 | ||
035 | |a (CUP)CR9781108869003 | ||
035 | |a (EBP)06369333X | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
044 | |c XA-GB |c XD-US |c XE-AU |c XB-IN |c XB-SG | ||
050 | 0 | |a HV6773 | |
082 | 0 | |a 363.325 |q LOC | |
084 | |a ST 277 |q SEPA |2 rvk |0 (DE-625)rvk/143643: | ||
100 | 1 | |a Marin, Ericsson |e VerfasserIn |0 (DE-588)1167978943 |0 (DE-627)1031674144 |0 (DE-576)511382804 |4 aut | |
109 | |a Marin, Ericsson | ||
245 | 1 | 0 | |a Exploring malicious hacker communities |b toward proactive cyber-defence |c Ericsson Marin (California State Polytechnic University, Pomona), Mohammed Almukaynizi (King Saud University), Soumajyoti Sarkar (Arizona State University), Eric Nunes (Arizona State University), Jana Shakarian (Cyber Reconnaissance, Inc.), Paulo Shakarian (Arizona State University and Cyber Reconnaissance, Inc.) ; foreword by Edward G. Amoroso (TAG Cyber) |
264 | 1 | |a Cambridge, United Kingdom |a New York, NY, USA |a Port Melbourne, VIC, Australia |a New Delhi, India |a Singapore |b Cambridge University Press |c 2021 | |
300 | |a 1 Online-Ressource (xii, 211 Seiten) |b Illustrationen, Diagramme | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Background -- Mining key-hackers -- Reasoning about hacker engagement -- Uncovering communities of malware and exploit vendors -- Identifying exploits in the wild proactively -- Predicting enterprise-targeted external cyber-attacks -- Bringing social network analysis to aid in cyber-attack prediction -- Finding at-risk systems without software vulnerability identifiers (CVE's) -- Final considerations. | ||
650 | 0 | |a Cyber intelligence (Computer security) | |
650 | 0 | |a Hackers |x Social networks | |
650 | 0 | |a Social Sciences |x Network analysis | |
650 | 0 | |a Data Mining | |
650 | 0 | |a Hacking |x Prevention | |
650 | 0 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Cyberterrorism ; Prevention | |
650 | 4 | |a Data Mining | |
650 | 4 | |a Social sciences ; Network analysis | |
650 | 4 | |a Hacking ; Prevention | |
650 | 4 | |a Hackers ; Social networks | |
689 | 0 | 0 | |d s |0 (DE-588)4113821-1 |0 (DE-627)105826642 |0 (DE-576)209479604 |a Hacker |2 gnd |
689 | 0 | 1 | |d s |0 (DE-588)4428654-5 |0 (DE-627)216935180 |0 (DE-576)212347217 |a Data Mining |2 gnd |
689 | 0 | 2 | |d s |0 (DE-588)7864395-8 |0 (DE-627)700634487 |0 (DE-576)363213635 |a Internetkriminalität |2 gnd |
689 | 0 | 3 | |d s |0 (DE-588)4076308-0 |0 (DE-627)104364106 |0 (DE-576)209201428 |a Prävention |2 gnd |
689 | 0 | 4 | |d s |0 (DE-588)4181167-7 |0 (DE-627)104353333 |0 (DE-576)210002980 |a Sicherheitsmaßnahme |2 gnd |
689 | 0 | |5 (DE-627) | |
700 | 1 | |a Almukaynizi, Mohammed |d 1987- |e VerfasserIn |0 (DE-588)1234083841 |0 (DE-627)1758948493 |4 aut | |
700 | 1 | |a Sarkar, Soumajyoti |d 1992- |e VerfasserIn |0 (DE-588)1234084449 |0 (DE-627)1758949759 |4 aut | |
700 | 1 | |a Nunes, Eric |e VerfasserIn |0 (DE-588)1167978951 |0 (DE-627)1031674152 |0 (DE-576)511382790 |4 aut | |
700 | 1 | |a Shakarian, Jana |d 1977- |e VerfasserIn |0 (DE-588)1234085062 |0 (DE-627)1758951133 |4 aut | |
700 | 1 | |a Shakarian, Paulo |d 1980- |e VerfasserIn |0 (DE-588)1234085496 |0 (DE-627)1758951982 |4 aut | |
700 | 1 | |a Amoroso, Edward G. |e VerfasserIn eines Vorworts |0 (DE-588)1089223838 |0 (DE-627)853032440 |0 (DE-576)45981527X |4 wpr | |
776 | 1 | |z 9781108491594 |c Festeinband | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Marin, Ericsson |t Exploring malicious hacker communities |d Cambridge, United Kingdom : Cambridge University Press, 2021 |h xii, 211 Seiten |w (DE-627)1744461880 |z 9781108491594 |
856 | 4 | 0 | |u https://www.cambridge.org/core/books/exploring-malicious-hacker-communities/4A6543BCF8703B8F7784309569093A85 |x Verlag |z lizenzpflichtig |3 Volltext |
856 | 4 | 0 | |u https://doi.org/10.1017/9781108869003 |m X:CUP |x Resolving-System |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-20-CBO | ||
912 | |a ZDB-20-CHS | ||
912 | |a ZDB-20-CTM | ||
912 | |a ZDB-20-CBS | ||
935 | |a mkri | ||
936 | r | v | |a ST 277 |b Sonstiges zur Sicherheit in der Datenverarbeitung |k Informatik |k Monografien |k Software und -entwicklung |k Sonstiges zur Sicherheit in der Datenverarbeitung |0 (DE-627)1271118971 |0 (DE-625)rvk/143643: |0 (DE-576)201118971 |
951 | |a BO | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 4446830295 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1757952500 | ||
LOK | |0 005 20240103144148 | ||
LOK | |0 008 240103||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-21 |c DE-627 |d DE-21 | ||
LOK | |0 092 |o k |p p | ||
LOK | |0 689 |a s |a eBook-Cambridge-Gesamt-EBA-2024 | ||
LOK | |0 852 |a DE-21 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 85640 |u https://doi.org/10.1017/9781108869003 |z Zugang für die Universität Tübingen | ||
LOK | |0 912 |a ZDB-20-CBO | ||
LOK | |0 935 |a ebok |a lbok | ||
LOK | |0 000 xxxxxnx a22 zn 4500 | ||
LOK | |0 001 397392516X | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1757952500 | ||
LOK | |0 005 20210903115852 | ||
LOK | |0 008 210903||||||||||||||||ger||||||| | ||
LOK | |0 040 |a DE-Frei85 |c DE-627 |d DE-Frei85 | ||
LOK | |0 689 |a s |a eBook-Cambridge-Gesamt-EBA-2024 | ||
LOK | |0 852 |a DE-Frei85 | ||
LOK | |0 852 1 |m p |9 00 | ||
LOK | |0 85640 |u https://doi.org/10.1017/9781108869003 |z Zugang für die Universität Tübingen | ||
LOK | |0 912 |a ZDB-20-CBO | ||
LOK | |0 935 |a ebok |a lbok | ||
LOK | |0 938 |k p | ||
ORI | |a WA-MARC-krimdok_oa001.raw |