Results 11 to 20 of about 79,970 (188)
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. [PDF]
Saeed S +4 more
europepmc +2 more sources
Cyber Threat Intelligence [PDF]
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire +2 more sources
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence ...
Tianfang Sun +3 more
doaj +1 more source
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]
Accepted paper at ICDE ...
Gao, Peng +8 more
openaire +2 more sources
Pivot Attack Classification for Cyber Threat Intelligence
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices within ...
Rafael Salema Marques +3 more
doaj +1 more source
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva +3 more
doaj +1 more source
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj +1 more source
IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi +2 more
doaj +1 more source
From Intelligence gathering to Cyber Threat Detection [PDF]
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA +2 more
doaj
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim +3 more
doaj +1 more source

