Results 11 to 20 of about 150,359 (291)

SmartSentry: Cyber Threat Intelligence in Industrial IoT

open access: yesIEEE Access
While the Internet of Things (IoT) paradigm has transformed connectivity, it has also brought with it previously unheard-of security risks. The categorization of IoT attacks using several machine learning techniques and a deep learning method is the main
Sapna Sadhwani   +3 more
doaj   +2 more sources

NLP-based techniques for Cyber Threat Intelligence

open access: yesComputer Science Review
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior.
Marco Arazzi   +6 more
openaire   +3 more sources

Integrating AI in security information and event management for real time cyber defense. [PDF]

open access: yesSci Rep
The increasing frequency and sophistication of cyber-attacks have exposed significant shortcomings in conventional detection systems, emphasizing the urgent need for more advanced Cyber Threat Intelligence (CTI) capabilities.
Khan S   +4 more
europepmc   +2 more sources

CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]

open access: yesJournal of International Legal Communication, 2022
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj   +1 more source

Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience

open access: yesBig Data and Cognitive Computing, 2022
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj   +1 more source

D2WFP: A Novel Protocol for Forensically Identifying, Extracting, and Analysing Deep and Dark Web Browsing Activities

open access: yesJournal of Cybersecurity and Privacy, 2023
The use of the unindexed web, commonly known as the deep web and dark web, to commit or facilitate criminal activity has drastically increased over the past decade.
Mohamed Chahine Ghanem   +4 more
doaj   +1 more source

Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector

open access: yesInformation, 2022
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market.
VirgĂ­nia de Melo Dantas Trinks   +3 more
doaj   +1 more source

Cyber Threat Intelligence [PDF]

open access: yes, 2018
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire   +2 more sources

An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion

open access: yesFuture Internet, 2021
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence ...
Tianfang Sun   +3 more
doaj   +1 more source

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]

open access: yes2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021
Accepted paper at ICDE ...
Gao, Peng   +8 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy