Results 1 to 10 of about 136,981 (193)

Cyber threat attribution using unstructured reports in cyber threat intelligence

open access: yesEgyptian Informatics Journal, 2023
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj   +2 more sources

CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]

open access: yesJournal of International Legal Communication, 2022
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj   +1 more source

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]

open access: yes2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021
Accepted paper at ICDE ...
Gao, Peng   +8 more
openaire   +2 more sources

D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

open access: yesJournal of Cybersecurity and Privacy, 2023
The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade.
Mohamed Chahine Ghanem   +4 more
doaj   +1 more source

Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis

open access: yesConnection Science, 2021
Smart and proactive surveillance of crowds has turned up into greater importance in recent years due to the increase in urban population and immutable crowd disasters. Although the behaviours that emerged in a crowd are often unpredictable, researches in
Elizabeth B. Varghese, Sabu M. Thampi
doaj   +1 more source

Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector

open access: yesInformation, 2022
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market.
Virgínia de Melo Dantas Trinks   +3 more
doaj   +1 more source

Establishment of The Cyber Diplomacy Toolbox (CDT) as a Joint Diplomatic Response to the European Union Against the Threat of Cyber Attack activity

open access: yesPoliticon, 2023
In June 2017, the European Union increased its vigilance regarding Cyber Attack/Cybercrime issues by deciding and supporting the establishment of a framework for EU joint diplomacy on cyber threat issues, called “The EU Cyber Diplomacy Toolbox (CDT ...
Miftahul Khausar, Abdul Rivai Ras
doaj   +1 more source

Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2022
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj   +1 more source

Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature

open access: yesThe African Journal of Information and Communication, 2020
Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks.
Nenekazi N. P. Mkuzangwe   +1 more
doaj   +3 more sources

The THREAT-ARREST Cyber-Security Training Platform [PDF]

open access: yes, 2020
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi   +10 more
core   +1 more source

Home - About - Disclaimer - Privacy