What do you think?
Rate this book


216 pages, Kindle Edition
Published April 4, 2017
after providing motivation for the use of cyber threat intelligence, we discussed online hacker community structure in detail and introduced data-mining and machine-learning techniques to digest large amounts of data from these communities. We then further analyzed this data and the structure of these hacker communities via unsupervised learning. Finally, we introduced models capable of leveraging this data to provide system-specific information with both a game theoretic host defense model and an industrial control system defense model. Through all of these applications, we hoped to illustrate the utility of cyber threat intelligence and demonstrate that systems with real-world value can be built.Notes