Results 141 to 150 of about 79,970 (188)
HoneyLite: A Lightweight Honeypot Security Solution for SMEs. [PDF]
AlQahtan N +3 more
europepmc +1 more source
Explainable artificial intelligence-based cyber resilience in internet of things networks using hybrid deep learning with improved chimp optimization algorithm. [PDF]
Alzakari SA +7 more
europepmc +1 more source
A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation. [PDF]
Abo-Alian A, Youssef M, Badr NL.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Cyber Threat Intelligence Exchange
2020Die Verarbeitung und der Austausch von Cyber Threat Intelligence (CTI) Informationen haben in den Vergangenen Jahren immer stärker an Bedeutung gewonnen. Dies kann auf verschiedene Faktoren zurückgeführt werden. Auf der einen Seite bietet der Informationsaustausch ein großes Potential die Informationsbasis von Unternehmen zu stärken und damit den ...
openaire +2 more sources
Artificial Intelligence in Cyber Threats Intelligence
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of ...
Roumen Trifonov +2 more
openaire +1 more source
Datenschutz und Datensicherheit - DuD, 2018
Cyber Threat Intelligence (CTI) hat sich als eigenstandige Disziplin der IT-Sicherheit etabliert und ist gekommen, um zu bleiben. Die Entwicklung ist noch lange nicht abgeschlossen, maschinelles Lernen und Assistenz-Systeme werden den Einsatz von CTI weiter vorantreiben.
openaire +1 more source
Cyber Threat Intelligence (CTI) hat sich als eigenstandige Disziplin der IT-Sicherheit etabliert und ist gekommen, um zu bleiben. Die Entwicklung ist noch lange nicht abgeschlossen, maschinelles Lernen und Assistenz-Systeme werden den Einsatz von CTI weiter vorantreiben.
openaire +1 more source
Cyber Threats and Exploring the Sources of Cyber Threat Intelligence
Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3)Cyber threat intelligence technology becomes a necessity in the context of the exponential evolution of information systems. The methods used by malicious actors are constantly evolving, becoming more and more sophisticated over time, thus making the task of security teams more difficult.
Adelaida STĂNCIULESCU +2 more
openaire +1 more source
Cyber Threat Intelligence for “Things”
2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2019Cyber Threat Intelligence (CTI) programs have gained momentum across the cybersecurity community. Whether they are vendor based or open source solutions, practitioners should be able to find an appropriate solution to enhance security for their IT infrastructure. The tangible world, i.e.
openaire +1 more source
Darkweb Cyber Threat Intelligence Mining
2017The important and rapidly emerging new field known as 'cyber threat intelligence' explores the paradigm that defenders of computer networks gain a better understanding of their adversaries by understanding what assets they have available for an attack.
John Robertson +6 more
openaire +1 more source

