Results 1 to 10 of about 80,725 (273)
Cyber Threat Intelligence : Challenges and Opportunities [PDF]
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +2 more sources
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj +3 more sources
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva +3 more
doaj +3 more sources
A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats [PDF]
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify ...
Pedro Santos +4 more
doaj +2 more sources
BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture [PDF]
The exponential growth of sophisticated cyber threats in Internet of Things (IoT) environments has exposed fundamental weaknesses in existing Cyber Threat Intelligence (CTI) platforms, including centralized architectures, trust deficits, privacy ...
Alaa Tolah
doaj +2 more sources
Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining [PDF]
The escalating frequency and severity of cyber-attacks have presented formidable challenges to the safeguarding of cyberspace. Named Entity Recognition (NER) technology is utilized for the rapid identification of threat entities and their relationships ...
Gan Liu, Kai Lu, Saiqi Pi
doaj +3 more sources
CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj +1 more source
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]
Accepted paper at ICDE ...
Peng Gao 0008 +8 more
openaire +2 more sources
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj +1 more source
The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade.
Mohamed Chahine Ghanem +4 more
doaj +1 more source

