Results 111 to 120 of about 139,452 (290)

A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. [PDF]

open access: yesSensors (Basel), 2023
Saeed S   +4 more
europepmc   +1 more source

Enabling pandemic‐resilient healthcare: Narrowband Internet of Things and edge intelligence for real‐time monitoring

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract The Internet of Things (IoT) in deploying robotic sprayers for pandemic‐associated disinfection and monitoring has garnered significant attention in recent research. The authors introduce a novel architectural framework designed to interconnect smart monitoring robotic devices within healthcare facilities using narrowband Internet of Things ...
Md Motaharul Islam   +9 more
wiley   +1 more source

Contextualized Filtering for Shared Cyber Threat Information. [PDF]

open access: yesSensors (Basel), 2021
Dimitriadis A   +6 more
europepmc   +1 more source

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Research on knowledge graph construction technology for cyber threat intelligence based on large language models

open access: yesTongxin xuebao
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan   +2 more
doaj   +2 more sources

Fault‐Tolerant Fuzzy Boundary Control for Nonlinear Distributed Parameter Systems Under Limited Measurements and Markovian Failures

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT This paper proposes a boundary control method for nonlinear distributed parameter systems (DPSs) with limited boundary measurements (BMs), as typically encountered in networked cyber‐physical processes with spatially distributed dynamics such as thermal and biomedical diffusion systems.
Yanlin Li   +5 more
wiley   +1 more source

Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy

open access: yesAustralian Journal of Public Administration, EarlyView.
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley   +1 more source

Vulnerability-Based Enrichment of Türkiye-Specific Cyber Threat Intelligence: Proactive Threat Hunting and Critical Vulnerability Analysis with TR-CERT and Exploit-DB Integration

open access: yesGüvenlik Stratejileri Dergisi
This study introduces a framework for cyber threat intelligence aimed at enhancing Türkiye’s proactive cybersecurity capabilities, specifically addressing security vulnerabilities.
Hüseyin Parmaksız
doaj   +1 more source

Home - About - Disclaimer - Privacy