Results 1 to 10 of about 80,725 (273)

Cyber Threat Intelligence : Challenges and Opportunities [PDF]

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +2 more sources

Cyber threat attribution using unstructured reports in cyber threat intelligence

open access: yesEgyptian Informatics Journal, 2023
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj   +3 more sources

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

open access: yesFuture Internet, 2020
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva   +3 more
doaj   +3 more sources

A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats [PDF]

open access: yesSensors
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify ...
Pedro Santos   +4 more
doaj   +2 more sources

BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture [PDF]

open access: yesScientific Reports
The exponential growth of sophisticated cyber threats in Internet of Things (IoT) environments has exposed fundamental weaknesses in existing Cyber Threat Intelligence (CTI) platforms, including centralized architectures, trust deficits, privacy ...
Alaa Tolah
doaj   +2 more sources

Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining [PDF]

open access: yesPeerJ Computer Science
The escalating frequency and severity of cyber-attacks have presented formidable challenges to the safeguarding of cyberspace. Named Entity Recognition (NER) technology is utilized for the rapid identification of threat entities and their relationships ...
Gan Liu, Kai Lu, Saiqi Pi
doaj   +3 more sources

CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]

open access: yesJournal of International Legal Communication, 2022
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj   +1 more source

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]

open access: yes2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021
Accepted paper at ICDE ...
Peng Gao 0008   +8 more
openaire   +2 more sources

Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience

open access: yesBig Data and Cognitive Computing, 2022
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj   +1 more source

D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

open access: yesJournal of Cybersecurity and Privacy, 2023
The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade.
Mohamed Chahine Ghanem   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy