Proactive Cyber Threat Intelligence

Automating the Intelligence Cycle based on Open Sources

de

Éditeur :

Springer Vieweg


Paru le : 2025-10-23



eBook Téléchargement , DRM LCP 🛈 DRM Adobe 🛈
Lecture en ligne (streaming)
105,49

Téléchargement immédiat
Dès validation de votre commande
Ajouter à ma liste d'envies
Image Louise Reader présentation

Louise Reader

Lisez ce titre sur l'application Louise Reader.

Description

This book explores innovative methods to enhance cybersecurity by leveraging official and unofficial information sources on the web. While traditional approaches like Cyber Threat Intelligence (CTI) and Security Information and Event Management (SIEM) rely on past breaches, this work emphasizes a proactive stance, utilizing Open Source Intelligence (OSINT) to predict and prepare for emerging threats. Drawing from crisis informatics and data mining, the research introduces automated approaches for collecting, enriching, and analyzing cybersecurity information across diverse web sources, providing security teams with tools to identify emerging threats while reducing manual workload. For security professionals and researchers, this work demonstrates how automation can enhance human expertise in cybersecurity, paving the way for more robust and proactive threat detection.
Pages
255 pages
Collection
n.c
Parution
2025-10-23
Marque
Springer Vieweg
EAN papier
9783658492403
EAN PDF
9783658492410

Informations sur l'ebook
Nombre pages copiables
2
Nombre pages imprimables
25
Taille du fichier
12841 Ko
Prix
105,49 €
EAN EPUB
9783658492410

Informations sur l'ebook
Nombre pages copiables
2
Nombre pages imprimables
25
Taille du fichier
16968 Ko
Prix
105,49 €

Dr.-Ing. Philipp Kühn is a post-doctoral researcher at the Chair of Science and Technology for Peace and Security (PEASEC) at the Technical University of Darmstadt, where he focuses on information retrieval for IT security using Natural Language Processing and Large Language Models while examining the intersection of technology and intergovernmental cybersecurity cooperation.

Suggestions personnalisées