Sustainable cyber-physical VANETs with AI-driven anomaly detection and energy-efficient multi-criteria routing using machine learning algorithms. [PDF]
Wong WK, Baskar S, Abubeker KM, Ng PK.
europepmc +1 more source
Terrorism, Perceived Threat, and Support for Surveillance: A Virtual Reality Experiment on Cyber vs. Conventional Terrorism. [PDF]
Snider KLG +5 more
europepmc +1 more source
AI-enabled cybersecurity framework for future 5G wireless infrastructures. [PDF]
Alam A, Umer A, Ullah I, Alsayat A.
europepmc +1 more source
ThreatFedChainAI: an adaptive edge blockchain architecture for big data-driven threat analytics in IoT networks. [PDF]
Ashwini N +5 more
europepmc +1 more source
Cyberattack event and arguments extraction based on feature interaction and few-shot learning. [PDF]
Han Y, Han W, Li A, Li S.
europepmc +1 more source
Incident-aware smart prioritization framework for penetration testing and prevention of URL-based cybersecurity attacks in industry 4.0 IoT networks. [PDF]
Nurlan Z +7 more
europepmc +1 more source
Leveraging explainable artificial intelligence for early detection and mitigation of cyber threat in large-scale network environments. [PDF]
Nalinipriya G +6 more
europepmc +1 more source
Related searches:
Cyber Threat Intelligence Exchange
2020Die Verarbeitung und der Austausch von Cyber Threat Intelligence (CTI) Informationen haben in den Vergangenen Jahren immer stärker an Bedeutung gewonnen. Dies kann auf verschiedene Faktoren zurückgeführt werden. Auf der einen Seite bietet der Informationsaustausch ein großes Potential die Informationsbasis von Unternehmen zu stärken und damit den ...
openaire +2 more sources
Overview of Cyber Threat Intelligence Description
2021The description of cyber threat information is the basis of threat intelligence sharing. Focusing on the description of threat information, this paper analyzes the threat intelligence standards at home and abroad, summarizes the description and analysis methods of threat intelligence and their advantages and disadvantages.
Liang Guo +5 more
openaire +1 more source
Cyber Threat Intelligence for “Things”
2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA), 2019Cyber Threat Intelligence (CTI) programs have gained momentum across the cybersecurity community. Whether they are vendor based or open source solutions, practitioners should be able to find an appropriate solution to enhance security for their IT infrastructure. The tangible world, i.e.
openaire +1 more source

