Results 1 to 10 of about 139,353 (191)
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj +3 more sources
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva +3 more
doaj +3 more sources
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]
Accepted paper at ICDE ...
Peng Gao 0008 +8 more
openaire +2 more sources
CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj +1 more source
The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade.
Mohamed Chahine Ghanem +4 more
doaj +1 more source
Towards the cognitive and psychological perspectives of crowd behaviour: a vision-based analysis
Smart and proactive surveillance of crowds has turned up into greater importance in recent years due to the increase in urban population and immutable crowd disasters. Although the behaviours that emerged in a crowd are often unpredictable, researches in
Elizabeth B. Varghese, Sabu M. Thampi
doaj +1 more source
Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market.
Virgínia de Melo Dantas Trinks +3 more
doaj +1 more source
In June 2017, the European Union increased its vigilance regarding Cyber Attack/Cybercrime issues by deciding and supporting the establishment of a framework for EU joint diplomacy on cyber threat issues, called “The EU Cyber Diplomacy Toolbox (CDT ...
Miftahul Khausar, Abdul Rivai Ras
doaj +1 more source
The THREAT-ARREST Cyber-Security Training Platform [PDF]
Cyber security is always a main concern for critical infrastructures and nation-wide safety and sustainability. Thus, advanced cyber ranges and security training is becoming imperative for the involved organizations.
ASA-M Al-Ghamdi +10 more
core +1 more source
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj +1 more source

