Results 21 to 30 of about 150,359 (291)

Pivot Attack Classification for Cyber Threat Intelligence

open access: yesJournal of Information Security and Cybercrimes Research, 2022
The initial access achieved by cyber adversaries conducting a systematic attack against a targeted network is unlikely to be an asset of interest. Therefore, it is necessary to use lateral movement techniques to expand access to different devices within ...
Rafael Salema Marques   +3 more
doaj   +1 more source

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

open access: yesFuture Internet, 2020
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva   +3 more
doaj   +1 more source

Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2022
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj   +1 more source

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

open access: yesIEEE Access, 2020
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi   +2 more
doaj   +1 more source

From Intelligence gathering to Cyber Threat Detection [PDF]

open access: yesRomanian Intelligence Studies Review, 2023
Intelligence plays a key role in the detection and neutralisation of threat actors in cyberspace, particularly when dealing with advanced ones. However, the relationship between intelligence and the final detection capabilities is not well–defined in ...
Antonio VILLALON-HUERTA   +2 more
doaj  

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

open access: yesFrontiers in Computer Science, 2020
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim   +3 more
doaj   +1 more source

Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data

open access: yesApplied Sciences, 2022
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro   +5 more
doaj   +1 more source

Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives

open access: yesIEEE Communications Surveys and Tutorials, 2023
Today’s cyber attacks have become more severe and frequent, which calls for a new line of security defenses to protect against them. The dynamic nature of new-generation threats, which are evasive, resilient, and complex, makes traditional security ...
Nan Sun   +6 more
semanticscholar   +1 more source

TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports [PDF]

open access: yesDigital Threats: Research and Practice
Understanding the modus operandi of adversaries aids organizations to employ efficient defensive strategies and share intelligence in the community. This knowledge is often present in unstructured natural language text within threat analysis reports.
N. Rani   +3 more
semanticscholar   +1 more source

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy