Results 251 to 260 of about 137,873 (290)
Some of the next articles are maybe not open access.
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
IEEE Communications Surveys and Tutorials, 2023Nan Sun, Ming Ding, Jiaojiao Jiang
exaly
Cyber Threats and Exploring the Sources of Cyber Threat Intelligence
Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3)Cyber threat intelligence technology becomes a necessity in the context of the exponential evolution of information systems. The methods used by malicious actors are constantly evolving, becoming more and more sophisticated over time, thus making the task of security teams more difficult.
Adelaida STĂNCIULESCU +2 more
openaire +1 more source
A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
IEEE Communications Surveys and Tutorials, 2021Daniel Schlette, Marco Caselli
exaly
Digest of Papers. Twenty-Eighth Annual International Symposium on Fault-Tolerant Computing (Cat. No.98CB36224), 1998
W. Bartlett +3 more
openaire +1 more source
W. Bartlett +3 more
openaire +1 more source

