Results 11 to 20 of about 80,725 (273)

Strategic Assessment of Cyber Security Contenders to the Brazilian Agribusiness in the Beef Sector

open access: yesInformation, 2022
The current international commercial structure places Brazilian Agribusiness in constant conflict to protect its interests before other nations in the global market.
Virgínia de Melo Dantas Trinks   +3 more
doaj   +1 more source

An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion

open access: yesFuture Internet, 2021
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence ...
Tianfang Sun   +3 more
doaj   +1 more source

Pivot Attack Classification for Cyber Threat Intelligence

open access: yesJournal of Information Security and Cybercrimes Research, 2022
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices within ...
Rafael Salema Marques   +3 more
doaj   +1 more source

Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2022
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj   +1 more source

Artificial intelligence in the cyber domain: Offense and defense [PDF]

open access: yes, 2020
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis.
Diep, Quoc Bao   +2 more
core   +1 more source

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

open access: yesIEEE Access, 2020
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi   +2 more
doaj   +1 more source

Unifying Cyber Threat Intelligence [PDF]

open access: yes, 2019
The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over recent years. Today, several different data formats with varying properties are available that allow to
Menges, Florian   +2 more
openaire   +2 more sources

Cyber Threat Intelligence [PDF]

open access: yes, 2018
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire   +2 more sources

From Intelligence gathering to Cyber Threat Detection [PDF]

open access: yesRomanian Intelligence Studies Review, 2023
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA   +2 more
doaj  

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

open access: yesFrontiers in Computer Science, 2020
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy