Results 1 to 10 of about 136,981 (193)
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj +2 more sources
CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj +1 more source
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]
Accepted paper at ICDE ...
Gao, Peng +8 more
openaire +2 more sources
The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade.
Mohamed Chahine Ghanem +4 more
doaj +1 more source
Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis
Smart and proactive surveillance of crowds has turned up into greater importance in recent years due to the increase in urban population and immutable crowd disasters. Although the behaviours that emerged in a crowd are often unpredictable, researches in
Elizabeth B. Varghese, Sabu M. Thampi
doaj +1 more source
Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market.
Virgínia de Melo Dantas Trinks +3 more
doaj +1 more source
In June 2017, the European Union increased its vigilance regarding Cyber Attack/Cybercrime issues by deciding and supporting the establishment of a framework for EU joint diplomacy on cyber threat issues, called “The EU Cyber Diplomacy Toolbox (CDT ...
Miftahul Khausar, Abdul Rivai Ras
doaj +1 more source
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj +1 more source
Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature
Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks.
Nenekazi N. P. Mkuzangwe +1 more
doaj +3 more sources
The THREAT-ARREST Cyber-Security Training Platform [PDF]
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi +10 more
core +1 more source

