Results 1 to 10 of about 150,300 (232)

A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. [PDF]

open access: yesSensors (Basel), 2023
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and ...
Saeed S   +4 more
europepmc   +2 more sources

A novel cyber threat intelligence platform for evaluating the risk associated with smart agriculture. [PDF]

open access: yesSci Rep
The rapid proliferation of Internet of Things (IoT) devices has brought about a profound transformation in our daily lives and work environments. However, this proliferation has also given rise to significant security challenges, as cybercriminals ...
Thilakarathne NN   +3 more
europepmc   +2 more sources

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. [PDF]

open access: yesSensors (Basel), 2022
Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications to accomplish their daily tasks. However, many of these applications are either
Ghaleb FA   +4 more
europepmc   +2 more sources

Cyber threat attribution using unstructured reports in cyber threat intelligence

open access: yesEgyptian Informatics Journal, 2023
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj   +2 more sources

Cyber Threat Intelligence : Challenges and Opportunities [PDF]

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +2 more sources

A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats. [PDF]

open access: yesSensors (Basel)
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify ...
Santos P   +4 more
europepmc   +2 more sources

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

open access: yesJournal of Cybersecurity and Privacy
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin   +4 more
doaj   +2 more sources

BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture. [PDF]

open access: yesSci Rep
The exponential growth of sophisticated cyber threats in Internet of Things (IoT) environments has exposed fundamental weaknesses in existing Cyber Threat Intelligence (CTI) platforms, including centralized architectures, trust deficits, privacy ...
Tolah A.
europepmc   +2 more sources

Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining. [PDF]

open access: yesPeerJ Comput Sci
The escalating frequency and severity of cyber-attacks have presented formidable challenges to the safeguarding of cyberspace. Named Entity Recognition (NER) technology is utilized for the rapid identification of threat entities and their relationships ...
Liu G, Lu K, Pi S.
europepmc   +3 more sources

AI-Based Holistic Framework for Cyber Threat Intelligence Management

open access: yesIEEE Access
Cyber Threat Intelligence (CTI) is an important asset for organisations to facilitate the safeguarding of their systems against new and emerging cyber threats.
Arnolnt Spyros   +8 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy