This book examines cyber threat intelligence obtained from the center of the malicious hacking underworld - the dark web. It studies these communities both qualitatively and quantitatively, leveraging techniques from data mining, machine learning and AI, and offering insights to both cybersecurity practitioners and researchers.
This book examines cyber threat intelligence obtained from the center of the malicious hacking underworld - the dark web. It studies these communities both qualitatively and quantitatively, leveraging techniques from data mining, machine learning and AI, and offering insights to both cybersecurity practitioners and researchers.