Results 231 to 240 of about 80,725 (273)
Some of the next articles are maybe not open access.
Datenschutz und Datensicherheit - DuD, 2018
Cyber Threat Intelligence (CTI) hat sich als eigenstandige Disziplin der IT-Sicherheit etabliert und ist gekommen, um zu bleiben. Die Entwicklung ist noch lange nicht abgeschlossen, maschinelles Lernen und Assistenz-Systeme werden den Einsatz von CTI weiter vorantreiben.
openaire +1 more source
Cyber Threat Intelligence (CTI) hat sich als eigenstandige Disziplin der IT-Sicherheit etabliert und ist gekommen, um zu bleiben. Die Entwicklung ist noch lange nicht abgeschlossen, maschinelles Lernen und Assistenz-Systeme werden den Einsatz von CTI weiter vorantreiben.
openaire +1 more source
Artificial Intelligence in Cyber Threats Intelligence
2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of ...
Roumen Trifonov +2 more
openaire +1 more source
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome
2020 International Conference on Cyber Security and Protection of Digital Services (Cyber Security), 2020In a cyber meta-reality filled with zero day exploits, autonomous code, Worms modeled from Stuxnet, and the coming onslaught of AI enabled malware, the need for actionable, virtually prescient threat intelligence is paramount. It is almost uniformly recognized that the current reactionary paradigm concerning cyber threats is severely lacking.
openaire +1 more source
Cyber Threats and Exploring the Sources of Cyber Threat Intelligence
Proceedings of the International Conference on Cybersecurity and Cybercrime (IC3)Cyber threat intelligence technology becomes a necessity in the context of the exponential evolution of information systems. The methods used by malicious actors are constantly evolving, becoming more and more sophisticated over time, thus making the task of security teams more difficult.
Adelaida STĂNCIULESCU +2 more
openaire +1 more source
Taxonomy of Cyber Threat Intelligence Framework
2022 13th International Conference on Information and Communication Technology Convergence (ICTC), 2022Ahmad Naim Irfan +3 more
openaire +1 more source
Temporal Aspects of Cyber Threat Intelligence
2023 IEEE International Conference on Big Data (BigData), 2023Angel Kodituwakku +4 more
openaire +1 more source
Cyber Threat Intelligence and Analysis
Cyber Threat Intelligence and Analysis offers a comprehensive exploration of the methodologies, tools, and practices essential for understanding and mitigating cyber threats in the modern digital age. Written by experts in the field, the book delves deep into the dynamic landscape of cybersecurity, providing both theoretical knowledge and practical ...Rajesh Jagadeesan Ravikumar, Nandhini S
openaire +1 more source
Knowledge for Cyber Threat Intelligence
2019Keeping up with threat intelligence is a must for a security analyst today. There is a volume of information present in `the wild' that affects an organization. We need to develop an artificial intelligence system that scours the intelligence sources, to keep the analyst updated about various threats that pose a risk to her organization.
openaire +1 more source
An Intelligent Cyber Threat Classification System
2023 25th International Conference on Advanced Communication Technology (ICACT), 2023Man-Ling Liao +4 more
openaire +1 more source
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives
IEEE Communications Surveys and Tutorials, 2023Nan Sun, Ming Ding, Jiaojiao Jiang
exaly

