Login / Signup
Exploring Emerging Hacker Assets and Key Hackers for Proactive Cyber Threat Intelligence.
Sagar Samtani
Ryan Chinn
Hsinchun Chen
Jay F. Nunamaker Jr.
Published in:
J. Manag. Inf. Syst. (2017)
Keyphrases
</>
network security
data mining
intelligent systems
database
information processing
cyber crime
intelligence gathering
data sets
neural network
website
social media
network traffic
cyber security
situational awareness