Hongmei ChiAngela R. MartinC. Scarlett
This chapter views cyber intelligence as the computational ability to identify what information to collect to successfully identify the threat without collecting irrelevant data. It focuses on the potential use of computational methods in intelligence work, insider security threats, and mobile health. The chapter overviews of data analysis uses in the field of Cyber threat intelligence (CTI) and insider threat. It examines the process of collecting and organizing data, various tools for text analysis, and several different analytic scenarios and techniques. Data science and big data analysis is gaining popularity due to widespread utility in many subfields of cybersecurity, such as Intrusion detection system, social networks, insider threat, and wireless body network. Indications that establishing hacker motivations is growing in relevance is seen in CTI analysis but is usually portrayed from the perspective of cyberattacks. Linguistic analysis is the scientific analysis of a language sample and is a form of textual analysis.
Yassine MalehMamoun AlazabLo’ai TawalbehImed Romdhani
Sara QamarZahid AnwarMohammad Ashiqur RahmanEhab Al‐ShaerBei-Tseng Chu
Pathik BavadiyaPurnima UpadhyayaAjay Chandrakant BhosleShubham GuptaNeha Gupta