Results 11 to 20 of about 79,970 (188)

Cyber Threat Intelligence [PDF]

open access: yes, 2018
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire   +2 more sources

An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion

open access: yesFuture Internet, 2021
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence ...
Tianfang Sun   +3 more
doaj   +1 more source

Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence [PDF]

open access: yes2021 IEEE 37th International Conference on Data Engineering (ICDE), 2021
Accepted paper at ICDE ...
Gao, Peng   +8 more
openaire   +2 more sources

Pivot Attack Classification for Cyber Threat Intelligence

open access: yesJournal of Information Security and Cybercrimes Research, 2022
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices within ...
Rafael Salema Marques   +3 more
doaj   +1 more source

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

open access: yesFuture Internet, 2020
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva   +3 more
doaj   +1 more source

Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2022
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj   +1 more source

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

open access: yesIEEE Access, 2020
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi   +2 more
doaj   +1 more source

From Intelligence gathering to Cyber Threat Detection [PDF]

open access: yesRomanian Intelligence Studies Review, 2023
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA   +2 more
doaj  

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

open access: yesFrontiers in Computer Science, 2020
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy