Results 21 to 30 of about 80,725 (273)

Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data

open access: yesApplied Sciences, 2022
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro   +5 more
doaj   +1 more source

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

Towards Cyber Threat Intelligence for the IoT

open access: yes2023 19th International Conference on Distributed Computing in Smart Systems and the Internet of Things (DCOSS-IoT), 2023
With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization's threat mitigation strategy. This Cyber Threat Intelligence (CTI) is becoming increasingly important, or rather necessary, for critical national and industrial ...
Iacovazzi, Alfonso   +3 more
openaire   +2 more sources

Serious, therefore organised? A critique of the emerging "cyber-organised crime" rhetoric in the United Kingdom [PDF]

open access: yes, 2016
This paper, based on discourse analysis of policy documents, departs from a critique of the juxtaposition of the terms "serious" and "organised" in policies against organised crime in the UK.
Lavorgna, A, Sergi, A
core   +1 more source

Dynamic cyber-incident response [PDF]

open access: yes, 2014
Permission to make digital or hard copies of this publication for internal use within NATO and for personal or educational use when for non-profi t or non-commercial purposes is granted providing that copies bear this notice and a full citation on the ...
Clewley, N   +3 more
core   +1 more source

Forensic and technical criminalistics support in cybercrime investigation

open access: yesRevista Científica General José María Córdova, 2022
The issue of cyber security has become a key State objective in Ukraine. Cyber espionage and cyber-attacks by intelligence agencies (predominantly non-democratic countries) have become the most significant modern threat to automated systems, surpassing ...
Andrii Padalka
doaj   +1 more source

Interoperability Challenges in the Cybersecurity Information Sharing Ecosystem

open access: yesComputers, 2020
Threat intelligence helps businesses and organisations make the right decisions in their fight against cyber threats, and strategically design their digital defences for an optimised and up-to-date security situation.
Konstantinos Rantos   +5 more
doaj   +1 more source

Personal HealthCare of Things: A novel paradigm and futuristic approach

open access: yesCAAI Transactions on Intelligence Technology, EarlyView., 2023
Abstract This study provides an investigative approach and offers a complete review of research on Internet of Medical Things (IoMT), describing the progress in general and highlighting the research issues, trends, and future aspects of IoMT. Exploring a research strategy for IoMT systems is vital as the need for IoT in healthcare grows. By aggregating
Surbhi Gupta   +5 more
wiley   +1 more source

Overview of the technologies of threat intelligence sensing,sharing and analysis in cyber space

open access: yes网络与信息安全学报, 2016
With a rapid development of information technologies including big data,cloud computing,Internet of things,etc.,the threats in cyber space also become more ubiquitous and complex.Moreover,more and more persis-tence and hidden features present in all ...
Jian-hua LI
doaj   +3 more sources

Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]

open access: yesJournal of Universal Computer Science, 2019
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj   +3 more sources

Home - About - Disclaimer - Privacy