Results 51 to 60 of about 79,970 (188)
The primary objective of this study is to investigate cybercrime threat intelligence in the context of attack trends and tactics, techniques, and procedures (TTPs) employed by cyber attack groups targeting the Arab world.
Seokhee Lee +2 more
doaj +1 more source
Perspectives for Cyber Strategists on Law for Cyberwar [PDF]
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core +1 more source
Enhanced threat intelligence framework for advanced cybersecurity resilience
The increasing severity of cyber-attacks against organizations emphasizes the necessity for efficient threat intelligence. This article presents a novel multi-layered architecture for threat intelligence that integrates diverse data streams, including ...
Moutaz Alazab +5 more
doaj +1 more source
Using cyber threat intelligence in SDN security
As the number and variety of cyber threats increase, it becomes more critical to share intelligence information in a fast and efficient manner. However, current cyber threat intelligence data do not contain sufficient information about how to specify countermeasures or how institutions should apply countermeasures automatically on their networks.
Yurekten, Ozgur, Demirci, Mehmet
openaire +3 more sources
Trustworthy Artificial Intelligence for Cyber Threat Analysis
Artificial Intelligence brings innovations into the society. However, bias and unethical exist in many algorithms that make the applications less trustworthy. Threats hunting algorithms based on machine learning have shown great advantage over classical methods.
Wang, Shuangbao Paul, Mullin, Paul
openaire +2 more sources
LLM-powered threat intelligence: a retrieval-augmented generation approach for cyber attack investigation [PDF]
Threat intelligence involves collecting, analyzing, and disseminating information about cyber threats to help organizations proactively defend against attacks.
Abeer Alhuzali
doaj +2 more sources
A New Perspective and Model Proposal for Cyber Threat Intelligence after Pager Attacks
This study explores the September 2024 pager attacks on Hezbollah as a case study to propose an expanded model for Cyber Threat Intelligence (CTI) within the framework of hybrid warfare.
Tuncay Doğantuna, Onur Ceran
doaj +1 more source
Percolation Model of Insider Threats to Assess the Optimum Number of Rules
Rules, regulations, and policies are the basis of civilized society and are used to coordinate the activities of individuals who have a variety of goals and purposes.
Gadepally, Vijay +2 more
core +1 more source
BVTED: A Specialized Bilingual (Chinese–English) Dataset for Vulnerability Triple Extraction Tasks
Extracting knowledge from cyber threat intelligence is essential for understanding cyber threats and implementing proactive defense measures. However, there is a lack of open datasets in the Chinese cybersecurity field that support both entity and ...
Kai Liu +4 more
doaj +1 more source

