Results 31 to 40 of about 79,970 (188)

Dynamic real-time risk analytics of uncontrollable states in complex internet of things systems, cyber risk at the edge [PDF]

open access: yes, 2020
The Internet of Things (IoT) triggers new types of cyber risks. Therefore, the integration of new IoT devices and services requires a self-assessment of IoT cyber security posture.
Ani, Uchenna   +9 more
core   +3 more sources

An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure

open access: yesJournal of Cybersecurity and Privacy
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategies and ...
Habib El Amin   +4 more
doaj   +1 more source

Cyber Threat Intelligence for Improving Cyber Supply Chain Security [PDF]

open access: yes2019 International Conference on Cyber Security and Internet of Things (ICSIoT), 2019
Cyber supply chain (CSC) systems provide operational efficiency and business continuity due to the integrated nature of various network system nodes. Such integration has made the overall system vulnerable to various cyber attacks and malware propagation is one of the common attacks for CSC.
Yeboah-Ofori, Abel   +2 more
openaire   +1 more source

Unifying Cyber Threat Intelligence [PDF]

open access: yes, 2019
The threat landscape and the associated number of IT security incidents are constantly increasing. In order to address this problem, a trend towards cooperative approaches and the exchange of information on security incidents has been developing over recent years. Today, several different data formats with varying properties are available that allow to
Menges, Florian   +2 more
openaire   +2 more sources

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

An Iterative Review Inspired Adaptive Cyber Threat Detection Model with Context Awareness & Meta-Learning with Generative Hybrid Anomaly Detection [PDF]

open access: yesITM Web of Conferences
Al-driven cyber security frameworks must adapt to more sophisticated threats and context-based detections. We can improve interpretability, flexibility, and resilience in data-scarce and hostile settings in the current model.
Rajurkar Jayant, Jogekar Ravindra
doaj   +1 more source

A New AI-Based Semantic Cyber Intelligence Agent

open access: yesFuture Internet, 2023
The surge in cybercrime has emerged as a pressing concern in contemporary society due to its far-reaching financial, social, and psychological repercussions on individuals.
Fahim Sufi
doaj   +1 more source

Cyber Threat Intelligence Platform [PDF]

open access: yes, 2016
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core  

HoloCyberChain: A distributed entropy-fingerprint blockchain for global cyber threat intelligence [PDF]

open access: yesAIP Advances
This study presents HoloCyberChain, an entropy-driven blockchain framework for decentralized cyber-threat intelligence with formal verification and privacy preservation.
Ali Algarni, Muhammad Zeshan Arshad
doaj   +1 more source

Discerning reliable cyber threat indicators for timely Cyber Threat Intelligence

open access: yesJournal of Computer Virology and Hacking Techniques
In today's dynamic cybersecurity landscape, timely and accurate threat intelligence is essential for proactive defense. This study explores the potential of social media platforms as a valuable resource for extracting actionable Indicators of Compromise (IoCs).
Arikkat, Dincy R   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy