Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement
Advanced Persistent Threat (APT) groups pose significant cybersecurity threats due to their sophisticated and persistent nature. This study introduces a novel methodology to understand their collaborative patterns and shared objectives, which is crucial ...
Zheng-Shao Chen +9 more
semanticscholar +1 more source
Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core
BVTED: A Specialized Bilingual (Chinese–English) Dataset for Vulnerability Triple Extraction Tasks
Extracting knowledge from cyber threat intelligence is essential for understanding cyber threats and implementing proactive defense measures. However, there is a lack of open datasets in the Chinese cybersecurity field that support both entity and ...
Kai Liu +4 more
doaj +1 more source
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
Explainable Artificial Intelligence for Resilient Security Applications in the Internet of Things
The performance of Artificial Intelligence (AI) systems reaches or even exceeds that of humans in an increasing number of complicated tasks. Highly effective non-linear AI models are generally employed in a black-box form nested in their complex ...
Mohammed Tanvir Masud +4 more
doaj +1 more source
Cyber Watch an Comprensive Security Tool [PDF]
The "Cyber Watch" initiative addresses the escalating need for comprehensive online security in our interconnected society. This paper is dedicated to safeguarding digital assets and ensuring a secure digital environment for users of all technical ...
Tripathi Surendra +6 more
doaj +1 more source
General Counsel of the FBI, James Baker, in Conversation with Professor Mary DeRosa on the FBI and International Justice [PDF]
Mary DeRosa, Georgetown Law Professor, former Deputy Counsel to President Obama for National Security Affairs, former Legal Advisor to the National Security Council under President Obama, and former Deputy Legal Adviser to the National Security Council ...
DeRosa, Mary B.
core +1 more source
Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but it remains an area showing silos and reserved for large organizations. For an area whose strength is in open and responsive sharing, we see that the generation
Vitor Jesus, Balraj Bains, Victor Chang
semanticscholar +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source

