Skip to main content Accessibility help
×
  • Cited by 36
Publisher:
Cambridge University Press
Online publication date:
April 2017
Print publication year:
2017
Online ISBN:
9781316888513

Book description

The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack. In this book, a team of experts examines a new type of cyber threat intelligence from the heart of the malicious hacking underworld - the dark web. These highly secure sites have allowed anonymous communities of malicious hackers to exchange ideas and techniques, and to buy/sell malware and exploits. Aimed at both cybersecurity practitioners and researchers, this book represents a first step toward a better understanding of malicious hacking communities on the dark web and what to do about them. The authors examine real-world darkweb data through a combination of human and automated techniques to gain insight into these communities, describing both methodology and results.

Reviews

'Darkweb Cyber Threat Intelligence Mining represents a tipping point in cyber security. It is a must-read for anyone involved in the modern cyber struggle.'

George Cybenko - Dartmouth College, New Hampshire, from the Foreword

'The book is well written and well structured. The authors provide interesting facts on the darknet economy, its community, and its underling rules, such as trust-based platforms and the related problems of its participants.'

Steffen Wendzel Source: Computing Reviews

Refine List

Actions for selected content:

Select all | Deselect all
  • View selected items
  • Export citations
  • Download PDF (zip)
  • Save to Kindle
  • Save to Dropbox
  • Save to Google Drive

Save Search

You can save your searches here and later view and run them again in "My saved searches".

Please provide a title, maximum of 40 characters.
×

Contents

References
[1] Ahmed, Abbasi, Weifeng, Li, Victor, Benjamin, Shiyu, Hu, and Hsinchun, Chen. Descriptive analytics: Examining expert hackers in web forums. In IEEE – Joint Intelligence and Security Informatics Conference (JISIC), pp. 56–63. TheHague, The Netherlands, September 2014.
[2] Lillian, Ablon, Martin C, Libicki, and Andrea A, Golay. Markets for Cybercrime Tools and Stolen Data: Hackers'Bazaar. Rand Corporation, 2014.
[3] Gunes, Acar, Marc, Juarez, Nick, Nikiforakis, Claudia, Diaz, Seda, Gürses, Frank, Piessens, and Bart, Preneel. Fpdetective: Dusting the web for fingerprinters. In Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS13, pp. 1129–1140, New York, NY, USA, 2013. ACM.
[4] Peter, Apps. A cyber attack turned out the lights on 80,000. what can stop the next one?, 2016. http://blogs.reuters.com/great-debate/2016/04/05/a-cyber-attackturned- out-the-lights-on-80000-what-can-stop-them/ (accessed October 6, 2016).
[5] Arma. Tor security advisory: Old tor browser bundles vulnerable. The Tor Project, August 2013. https://blog.torproject.org/blog/tor-security-advisory-oldtor- browser-bundles-vulnerable (accessed October 6, 2016).
[6] Yossi, Azar and Iftah, Gamzu. Efficient submodular function maximization under linear packing constraints. ICALP, 1:38–50, 2012.
[7] John A., Bargh and Katelyn Y. A., McKenna. The internet and social life. volume 55, pp. 573–590, 2004.
[8] Mikhail, Belkin and Partha, Niyogi. Using manifold structure for partially labelled classification. In Advances in NIPS, volume 15, pp. 929–936. MIT Press. 2003.
[9] Victor A., Benjamin,Weifeng, Li, Thomas J., Holt, and Hsinchun, Chen. Exploring threats and vulnerabilities in hacker web: Forums, irc, and carding shops. In 2015 International Conference on Intelligence and Security Informatics (IEEE), pp. 85–90, Baltimore, MD, USA, May 2015.
[10] Leyla, Bilge and Tudor, Dumitras. Before we knew it: an empirical study of zeroday attacks in the real world. In Proceedings of the 2012 ACM conference on Computer and communications security, pp. 833–844. ACM, 2012.
[11] Christopher M., Bishop and Ilkay, Ulusoy. Object recognition via local patch labelling. In Joab, Winkler, Mahesan, Niranjan, Neil, Lawrence, editors. Deterministic and Statistical Methods in Machine Learning, pp. 1–21, Springer, Berlin, Heidelberg, 2005.
[12] David M, Blei, Andrew, Y Ng, and Michael I, Jordan. Latent dirichlet allocation. the Journal of Machine Learning Research, 3:993–1022, 2003.
[13] Avrim, Blum and Tom, Mitchell. Combining labeled and unlabeled data with cotraining. In Proceedings of the Eleventh Annual Conference on Computational Learning Theory, COLT' 98, pp. 92–100, New York, NY, USA, 1998. ACM.
[14] J. E., Bodford. We Are Legion: Hacktivism as a Product of Deindividuation,Power, and Social Injustice. PhD thesis, Arizona State University, 2015.
[15] Tom, Boellstorff. Coming of Age in Second Life: An Anthropologist Explores the Virtually Human. Princeton University Press, Princeton, NJ, USA, 2008.
[16] Danny, Bradbury. Unveiling the dark web. Network Security, volume 2014, pp. 14–17, 2014.
[17] Jeffrey, Carr. Inside Cyber Warfare: Mapping the Cyber Underworld. O'Reilly Media, Inc. 2011.
[18] Soumen, Chakrabarti, Kunal, Punera, and Mallela, Subramanyam. Accelerated focused crawling through online relevance feedback. In Proceedings of the 11th International Conference on World Wide Web, pp. 148–159. ACM, 2002.
[19] Soumen, Chakrabarti, Martin, Van den Berg, and Byron, Dom. Focused crawling: a new approach to topic-specific web resource discovery. Computer Networks, 31(11):1623–1640, 1999.
[20] Hsinchun, Chen. Dark web: Exploring and Data Mining the Dark Side of the Web , volume 30. Springer Science & Business Media, 2011.
[21] Hsinchun, Chen, Wingyan, Chung, Jialun, Qin, Edna, Reid, Marc, Sageman, and Gabriel, Weimann. Uncovering the dark web: A case study of jihad on the web. Journal of the American Society for Information Science and Technology, volume 59, pp. 1347–1359. 2008.
[22] Hong, Cheng, Zicheng, Liu, and Jie, Yang 0001. Sparsity induced similarity measure for label propagation. In 2009 IEEE 12th International Conference on Computer Vision, pp. 317–324. IEEE, 2009.
[23] Bill, Chu, Thomas J., Holt, and Gail, Joon Ahn. Examining the Creation, Distribution, and Function of Malware On Line. Washington, D.C., 2010. National Institute of Justice.
[24] E., Gabriella Coleman. Ethnographic approaches to digitalmedia. Annual Review of Anthropology, volume 39, pp. 487–505, 2010.
[25] E., Gabriella Coleman. Coding Freedom: The Ethics and Aesthetics of Hacking. Princeton University Press, 2013.
[26] Mandiant Consulting. M-trends 2016 cyber security trends. 2016. https://www. fireeye.com/current-threats/annual-threat-report/mtrends.html (accessed October 6, 2016).
[27] Thomas H, Cormen. Introduction to Algorithms. MIT Press, 2009.
[28] The MITRE Corporation. CVE-2009-1185, 2009.
[29] Corinna, Cortes and Vladimir, Vapnik. Support-vector networks. Machine Learning, volume 20, pp. 273–297, 1995.
[30] R., Dingledine, N., Mathewson, and P., Syverson. Tor: The second-generation onion router. In Proceedings of the 13th Conference on USENIX Security Symposium use serial (Oxford) comma: x, y, and z)— Volume 13, SSYM'04, pp. 21–21, 2004.
[31] Wim B. H. J., van de Donk (ed.). Cyberprotest : New Media, Citizens, and Social Movements. Routledge London; New York, 2004.
[32] David Fackler, N.S.A. breached North Korean networks before Sony attack, officials say, 2015. http://www.nytimes.com/2015/01/19/world/asia/nsa-tappedinto- north-korean-networks-before-sony-attack-officials-say.html (accessed October 6, 2016).
[33] Nicolas, Falliere, Liam O, Murchu, and Eric, Chien. W32. stuxnet dossier. White paper, Symantec Corp., Security Response, 5, 2011.
[34] Uriel, Feige. A threshold of ln n for approximating set cover. J. ACM, 45(4):634–652, July 1998.
[35] Jim, Finkle. Cyber insurance premiums rocket after high-profile attacks, 2016. http://www.reuters.com/article/us-cybersecurity-insurance-insightidUSKCN0S609M20151012 (accessed October 6, 2016).
[36] F, Flammini, A, Gaglione, N, Mazzocca, and C, Pragliola. Detect: a novel framework for the detection of attacks to critical infrastructures. Safety, Reliability and Risk Analysis: Theory, Methods and Applications-Proceedings of ESREL'08, pp. 105–112, 2014.
[37] Tianjun, Fu, Ahmed, Abbasi, and Hsinchun, Chen. A focused crawler for dark web forums. Journal of the American Society for Information Science and Technology, 61(6):1213–1231, 2010.
[38] Yezekael, Hayel and Quanyan, Zhu. Resilient and secure network design for cyber attack-induced cascading link failures in critical infrastructures. In Information Sciences and Systems (CISS), 2015 49th Annual Conference on, pp. 1–3. IEEE, 2015.
[39] Thomas J., Holt. Lone hacks or group cracks: Examining the social organization of computer hackers. In Schmalleger, Frank J., and Michael, Pittaro, editors, Crimes of the Internet, pp. 336–355. Prentice Hall Press, Upper Saddle River, NJ, USA, 1st edition, 2009.
[40] Thomas J., Holt and Bernadette H., Schell. Hackers and Hacking: A Reference Handbook . Contemporary World Issues. ABC-CLIO, LLC, 2013.
[41] Thomas J., Holt, Deborah, Strumsky, Olga, Smirnova, andMax, Kilger. Examining the social networks of malware writers and hackers. International Journal of Cyber Criminology, volume 6, pp. 891–903, 2012.
[42] Thomas J. (ed.), Holt. Crime On-Line—Correlates, Causes, and Context. Caroline Academic Press, 2nd edition, 2013.
[43] Peter, Holtz, Nicole, Kronberger, and Wolfgang, Wagner. Analyzing internet forums: A practical guide. Journal of Media Psychology, volume 24, pp. 55–66, 2012.
[44] Courtenay, Honeycutt and Susan, Herring. Beyond microblogging: Conversation and collaboration via twitter. System Sciences, 2009. HICSS'09. 42nd Hawaii International Conference on. IEEE, volume 42, pp. 1–10, 2009.
[45] Alice, Hutchings and Thomas J., Holt. A crime script analysis of the online stolen data market. British Journal of Criminology, volume 55, pp. 596–614, 2014.
[46] K., Jaishankar. Space transition theory of cyber crimes. In Schmalleger, Frank J., and Michael, Pittaro, editors, Crimes of the Internet, pp. 283–301. Prentice Hall Press, Upper Saddle River, NJ, USA, 1st edition, 2009.
[47] Sushil, Jajodia, Anup K, Ghosh, VS, Subrahmanian, Vipin, Swarup, Cliff, Wang, and X, Sean Wang. Moving target defense ii. Application of Game Theoryand Adversarial Modeling. Series: Advances in Information Security, 100:203, 2013.
[48] Sushil, Jajodia, Anup K, Ghosh, Vipin, Swarup, Cliff, Wang, and X, Sean Wang. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats, volume 54. Springer Science & Business Media, 2011.
[49] Akshay, Java, Xiaodan, Song, Tim, Finin, and Belle, Tseng. Why we twitter: Understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 Workshop on Web Mining and Social Network Analysis,WebKDD/SNA-KDD '07, pp. 56–65, NewYork,NY,USA, 2007. ACM.
[50] Robert E, Johnson III. Survey of SCADA security challenges and potential attack vectors. In Internet Technology and Secured Transactions (ICITST), 2010 International Conference for, pp. 1–5. IEEE, 2010.
[51] Tim, Jordan and Paul, Taylor. A sociology of hackers. The Sociological Review, volume 46, pp. 757–780. Blackwell Publishing Ltd, 1998.
[52] Jeffrey S., Juris. Reflections on occupy everywhere: Social media, public space, and emerging logics of aggregation. American Ethnologist, 39(2):259–279, 2012.
[53] Stamatis, Karnouskos. Stuxnet worm impact on industrial cyber-physical system security. In IECON 2011-37th Annual Conference on IEEE Industrial Electronics Society, pp. 4490–4494. IEEE, 2011.
[54] Swati, Khandelwal. Malware and hacking forum seized, dozens arrested. July 2015. http://thehackernews.com/2015/07/darkode-hacking-forum.html (accessed October 6, 2016). http://thehackernews.com/2016/01/MegalodonHTTPDDoS- Botnet.html (accessed October 6, 2016).
[55] Swati, Khanderwal. Creator of megalodonhttp ddos botnet arrested. January 2016. http://thehackernews.com/2016/01/MegalodonHTTP-DDoS-Botnet.html (accessed October 6, 2016).
[56] Christopher, Kiekintveld, Viliam, Lisý, and Radek, Píbil. Game-theoretic foundations for the strategic use of honeypots in network security. In Sushil, Jajodia, Paulo, Shakarian, V.S., Subrahmanian, Vipin, Swarup, Cliff, Wang, editors, Cyber Warfare—Building the Scientific Foundation, Springer International Publishing, pp. 81–101. 2015.
[57] Bronislaw, Knaster and A, Tarski. Un théoreme sur les fonctions d'ensembles. Ann. Soc. Polon. Math, 6(133):2013134, 1928.
[58] Robert V., Kozinets. Netnography: Doing Ethnographic Research Online. Sage Publications Ltd., 2009.
[59] Brian, Krebs. Target hackers broke in via hvac company—Krebs on security, 2016. https://krebsonsecurity.com/2014/02/target-hackers-broke-in-via-hvaccompany/ (accessed October 6, 2016).
[60] David, Lacey and Paul M., Salmon. It's dark in there: Using systems analysis to investigate trust and engagement in dark web forums. In D., Harris, editor, Engineering Psychology and Cognitive Ergonomics, volume 9174 of Lecture Notes in Computer Science, pp. 117–128. Springer International Publishing, 2015.
[61] Jure, Leskovec, Andreas, Krause, Carlos, Guestrin, Christos, Faloutsos, Jeanne, VanBriesen, and Natalie, Glance. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM, 2007.
[62] Anat, Levin, Dani, Lischinski, and Yair, Weiss. A closed form solution to natural image matting. In Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition—Volume 1, CVPR '06, pp. 61–68, Washington, DC, USA, 2006. IEEE Computer Society.
[63] Steven, Levy. Hackers: Heroes of the Computer Revolution. Doubleday, New York, NY, USA, 1984.
[64] Weifeng, Li and Hsinchun, Chen. Identifying top sellers in underground economy using deep learning-based sentiment analysis. In Intelligence and Security Informatics Conference (JISIC), 2014 IEEE Joint, pp. 64–67, Sept 2014.
[65] Andrea, Locatelli. The offense/defense balance in cyberspace. ISPI Analysis, No. 203, October 2013.
[66] Kong-wei, Lye and Jeannette, M Wing. Game strategies in network security. International Journal of Information Security, 4(1):71–86, 2005.
[67] William, J Lynn III. Defending a new domain. Foreign Affairs, 89(5):97–108, 2010.
[68] Mitch, Macdonald, Richard, Frank, Joseph, Mei, and Bryan, Monk. Identifying digital threats in a hacker web forum. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, ASONAM '15, pp. 926–933, New York, NY, USA, 2015. ACM.
[69] D. E., Mann and S. M., Christey. Towards a Common Enumeration of Vulnerabilities, 1999. http://www.cve.mitre.org/docs/docs-2000/cerias.html (accessed October 6, 2016).
[70] Ericsson, Marin, Ahmad, Diab, and Paulo, Shakarian. Product offerings in malicious hacker markets. IEEE Conference on Intelligence and Security Informatics (ISI-16), 2016.
[71] Stefano, Marrone, Roberto, Nardone, Annarita, Tedesco, Pasquale, D'Amore, Valeria, Vittorini, Roberto, Setola, Francesca, De Cillis, and Nicola, Mazzocca. Vulnerability modeling and analysis for critical infrastructure protection applications. International Journal of Critical Infrastructure Protection, 6(3):217–227, 2013.
[72] Martha, McCaughey and Michael, D. Ayers, editors. Cyberactivism: Online Activism in Theory and Practice. Taylor and Francis, Inc., Bristol, PA, USA, 2003.
[73] H, Brendan McMahan, Geoffrey, J Gordon, and Avrim, Blum. Planning in the presence of cost functions controlled by an adversary. In Proceedings of the Twentieth International Conference On Machine Learning, pp. 536–543, 2003.
[74] Joseph, Mei and Richard, Frank. Sentiment crawling: Extremist content collection through a sentiment analysis guided web-crawler. In Proceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015, pp. 1024–1027. ACM, 2015.
[75] Filippo, Menczer, Gautam, Pant, and Padmini, Srinivasan. Topical web crawlers: Evaluating adaptive algorithms. ACM Transactions on Internet Technology (TOIT), 4(4):378–419, 2004.
[76] Michel, Minoux. Accelerated greedy algorithms for maximizing submodular set functions. In J., Stoer, editor, Optimization Techniques, volume 7 of Lecture Notes in Control and Information Sciences, pp. 234–243. Springer Berlin Heidelberg, 1978.
[77] Marti, Motoyama, Damon, McCoy, Kirill, Levchenko, Stefan, Savage, and Geoffrey, M. Voelker. An analysis of underground forums. In Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11, pp. 71–80. ACM, New York, NY, USA, 2011.
[78] G.L., Nemhauser, L.A., Wolsey, and M.L., Fisher. An analysis of approximations for maximizing submodular set functions. Mathematical Programming, 14(1):265–294, 1978.
[79] Kien, C Nguyen, Tansu, Alpcan, and Tamer, Başar. Stochastic games for security in networks with interdependent nodes. In Game Theory for Networks, 2009. GameNets' 09. International Conference on, pp. 697–703. IEEE, 2009.
[80] Eric, Nunes, Ahmad, Diab, Andrew, Gunn, Ericsson, Marin, Vineet, Mishra, Vivin, Paliath, John, Robertson, Jana, Shakarian, Amanda, Thart, and Paulo, Shakarian. Darknet and deepnetmining for proactive cybersecurity threat intelligence.IEEE Conference on Intelligence and Security Informatics (ISI-16), 2016.
[81] Federal Bureau of Investigation. Cyber criminal forum taken down— members arrested in 20 countries, July 2015. https://www.fbi.gov/news/stories/cyber-criminal-forum-taken-down (accessed October 6, 2016).
[82] Vivin, Paliath and Paulo, Shakarian. Modeling cyber-attacks on industrial control systems. IEEE Conference on Intelligence and Security Informatics (ISI-16), 2016.
[83] Ben, Plesser.Skilled, cheap Russian hackers power American cybercrime. NBC News, February 2014.
[84] Boris, Podobnik, Davor, Horvatic, Tomislav, Lipic, Matjaz, Perc, Javier, M Buldu, and H, Eugene Stanley. The cost of attack in competing networks. Journal of The Royal Society Interface, 12(112):20150770, 2015.
[85] John, Postill and Sarah, Pink. Social media ethnographie: The digital researcher in a messy web. Media International Australia, volume 145, pp. 123–134, 2012.
[86] Andrew, Quodling. Doxxing, swatting and the new trends in online harassment. The Conversation, April 2015.
[87] William M., Rand. Objective Criteria for the Evaluation of Clustering Methods. Journal of the American Statistical Association, 66(336):846–850, December 1971.
[88] Michael, Rausch, Nathan, Good, and Chris J., Hoofnagle. Searching for indicators of device fingerprinting in the javascript code of popular websites. Proceedings, Midwest Instruction and Computing Symposium, 2014.
[89] John, Robertson, Ahmad, Diab, Ericsson, Marin, Eric, Nunes, Vivin, Paliath, Jana, Shakarian, and Paulo, Shakarian. Darkweb mining and game theory for enhanced cyber threat intelligence. The Cyber Defense Review, volume 2, 2016.
[90] John, Robertson,Vivin, Paliath, Jana, Shakarian,Amanda, Thart, and Paulo, Shakarian. Data driven game theoretic cyber threat mitigation. In Proc. 28th Innovative Applications of Artificial Intelligence (IAAI-16), 2016.
[91] Patrick, Roos, J, Ryan Carr, and Dana, S Nau. Evolution of state-dependent risk preferences. ACM Transactions on Intelligent Systems and Technology (TIST), 1(1):6, 2010.
[92] Sagar, Samtani, Ryan, Chinn, and Hsinchun, Chen. Exploring hacker assets in underground forums. Intelligence and Security Informatics (ISI), 2015 IEEE International Conference on. IEEE, pp. 31–36, May 2015.
[93] Jana, Shakarian, Paulo, Shakarian, and Andrew Ruef. Cyber-attacks and public embarrassment:Asurvey of some notable hacks. Elsevier SciTechConnect, 2015. https://www.researchgate.net/publication/271217696_Cyber_Attacks_and_Public_Embarrassment_A_Survey_of_Some_Notable_Hacks (accessed October 6, 2016).
[94] P., Shakarian and J., Shakarian. Considerations for the development of threat prediction in the cyber domain. AAAI Workshop on Artificial Intelligence for Cyber Security (AICS), 2015.
[95] P., Shakarian, J., Shakarian, and A., Ruef. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Elsevier Science, 2013.
[96] Paulo, Shakarian. The 2008 Russian cyber-campaign against Georgia. Military Review, volume 91, Nov.-Dec., p. 63, 2011.
[97] Paulo, Shakarian. Stuxnet: Cyberwar revolution in military affairs. Small Wars Journal, April 2011. http://smallwarsjournal.com/jrnl/art/stuxnet-cyberwarrevolution-in-military-affairs (accessed October 6, 2016).
[98] Paulo, Shakarian, Hansheng, Lei, and Roy, Lindelauf. Power grid defense against malicious cascading failure. In Proceedings of the 2014 international conference on Autonomous agents and multi-agent systems, pp. 813–820. International Foundation for Autonomous Agents and Multiagent Systems, 2014.
[99] Paulo, Shakarian and J., Shakarian. Considerations for the development of threat prediction in the cyber domain. In AAAI-16 Workshop on Artificial Intelligence for Cyber Security, 2016.
[100] Paulo, Shakarian and Jana, Shakarian. Socio-cultural modeling for cyber threat actors. In Workshops at the Thirtieth AAAI Conference on Artificial Intelligence, 2016.
[101] Jeffrey G., Snodgrass. Ethnography of online cultures. In Bernard H., Russell, and Clarence C., Gravlee, editors, Handbook of Methods in Cultural Anthropology, pp. 465–496. Rowman and Littlefield, London, UK, 2015.
[102] Kyle, Soska and Nicolas, Christin. Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In 24th USENIX Security Symposium (USENIX Security 15), pp. 33–48, Washington, D.C., August 2015. USENIX Association.
[103] Siddharth, Sridhar and Manimaran, Govindarasu. Model-based attack detection and mitigation for automatic generation control. Smart Grid, IEEE Transactions on, 5(2):580–591, 2014.
[104] Kevin F., Steinmetz. Craft(y)ness: An ethnographic study of hacking. British Journal of Criminology, 55(1):125–145, 2015.
[105] Kevin F., Steinmetz and Jurgen, Gerber. “It doesn't have to be this way”: Hacker perspectives on privacy. 41(3):29–51, 2015.
[106] L., Stouffer, V., Pilitteri, S., Lightman, M., Abrams, and A., Hahn. Guide to industrial control systems (ICS) security, NIST special publication 800.82, pp. 16–16, 2011.
[107] Milind, Tambe. Security and Game Theory: Algorithms, Deployed Systems, Lessons Learned. Cambridge University Press, New York, NY, USA, 1st edition, 2011.
[108] Andrew S., Tanenbaum and David J., Wetherall. Computer Networks. Prentice Hall Press, Upper Saddle River, NJ, USA, 5th edition, 2010.
[109] Paul A., Taylor. From hackers to hacktivists: speed bumps on the global superhighway? New Media and Society, 7(5):625–646, 2005.
[110] Robert W., Taylor, Eric J., Fritsch, and John, Liederbach. Digital Crime and Digital Terrorism. Prentice Hall Press, 3rd edition, 2014.
[111] Sherry, Turkle. The Second Self: Computers and the Human Spirit. Simon and Schuster, Inc., New York, NY, USA, 1984.
[112] US-CERT. GNU Bourne-Again Shell (Bash) “Shellshock” Vulnerability (CVE- 2014-6271, CVE-2014-7169, CVE-2014-7186, CVE-2014-7187, CVE-2014- 6277 and CVE-2014-6278), 2014.
[113] Dan S., Wall. Cybercrime: The Transformation of Crime in the Information Age. Polity, 1st edition, 2007.
[114] Changhu, Wang, Shuicheng, Yan, Lei, Zhang 0001, and Hong-Jiang, Zhang. Multilabel sparse coding for automatic image annotation. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on, pp. 1643–1650. IEEE, 2009.
[115] Wang, Wei. Hunting Russian malware author behind Phoenix exploit kit. April 2013. http://thehackernews.com/2013/04/hunting-russian-malware-authorbehind.html (accessed October 6, 2016).
[116] Bryce, Westlake, Martin, Bouchard, and Richard, Frank. Assessing the validity of automated webcrawlers as data collection tools to investigate online child sexual exploitation. Sexual Abuse: A Journal of Research and Treatment, pp. 1–24, 2015.
[117] Kyle, Wilhoit. Killdisk and blackenergy are not just energy sector threats— trendlabs security intelligence blog, 2016. http://blog.trendmicro.com/trendlabssecurity-intelligence/killdisk-and-blackenergy-are-not-just-energy-sector-threats/(accessed October 6, 2016).
[118] Ziming, Zhao, Gail-Joon, Ahn, Hongxin, Hu, and Deepinder, Mahi. Socialimpact: Systematic analysis of underground social dynamics. In Sara, Foresti, Moti, Yung, and Fabio, Martinelli, editors, Esorics, volume 7459 of Lecture Notes in Computer Science, pp. 877–894. Springer, 2012.
[119] Xiaojin, Zhu, John, Lafferty, and Zoubin, Ghahramani. Combining active learning and semi-supervised learning using gaussian fields and harmonic functions. In ICML 2003 Workshop on The Continuum from Labeled to Unlabeled Data in Machine Learning and Data Mining, pp. 58–65, 2003.

Metrics

Altmetric attention score

Full text views

Total number of HTML views: 0
Total number of PDF views: 0 *
Loading metrics...

Book summary page views

Total views: 0 *
Loading metrics...

* Views captured on Cambridge Core between #date#. This data will be updated every 24 hours.

Usage data cannot currently be displayed.