Product offerings in malicious hacker markets
暂无分享,去创建一个
[1] Hsinchun Chen,et al. Dark Web: Exploring and Mining the Dark Side of the Web , 2012, 2011 European Intelligence and Security Informatics Conference.
[2] Paulo Shakarian,et al. Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks , 2015, ArXiv.
[3] Christopher C. Yang,et al. Identifying Dark Web clusters with temporal coherence analysis , 2011, Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics.
[4] Paulo Shakarian,et al. Data Driven Game Theoretic Cyber Threat Mitigation , 2016, AAAI.
[5] Ziming Zhao,et al. SocialImpact: Systematic Analysis of Underground Social Dynamics , 2012, ESORICS.
[6] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[7] William M. Rand,et al. Objective Criteria for the Evaluation of Clustering Methods , 1971 .
[8] Nicolas Christin,et al. Traveling the silk road: a measurement analysis of a large anonymous online marketplace , 2012, WWW.
[9] Richard Frank,et al. Identifying digital threats in a hacker web forum , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).
[10] Paulo Shakarian,et al. Socio-Cultural Modeling for Cyber Threat Actors , 2016, AAAI Workshop: Artificial Intelligence for Cyber Security.
[11] Hsinchun Chen,et al. Exploring threats and vulnerabilities in hacker web: Forums, IRC and carding shops , 2015, 2015 IEEE International Conference on Intelligence and Security Informatics (ISI).
[12] Paulo Shakarian,et al. Exploring Malicious Hacker Forums , 2016, Cyber Deception.
[13] Hsinchun Chen. Dark Web: Exploring and Data Mining the Dark Side of the Web , 2011 .