Results 81 to 90 of about 79,970 (188)

Redefining Cyber Threat Intelligence with Artificial Intelligence: From Data Processing to Predictive Insights and Human–AI Collaboration

open access: yesApplied Sciences
The increasing complexity and scale of cyber threats have pushed Cyber Threat Intelligence (CTI) beyond the capabilities of traditional rule-based systems.
Mateo Barrios-González   +3 more
doaj   +1 more source

IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data

open access: yesMathematics
In the dynamic landscape of cyberspace, organizations face a myriad of coordinated advanced threats that challenge the traditional defense paradigm. Cyber Threat Intelligence (CTI) plays a crucial role, providing in-depth insights into adversary groups ...
Xiayu Xiang   +4 more
doaj   +1 more source

Unified cyber threat intelligence

open access: yes, 2018
Ao longo dos anos, a preocupação com a Ciber Seguranc¸a (a proteção de sistemas, redes e de informações num ciber espaço) nas grandes empresas tem vindo a aumentar, isto porque, atualmente a maioria das organizações depende de dados informatizados e partilham grandes quantidades de informação por todo o globo, tornando-se em alvos mais fáceis para ...
openaire   +1 more source

NLP-based techniques for Cyber Threat Intelligence

open access: yesComputer Science Review
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior.
Marco Arazzi   +6 more
openaire   +2 more sources

Next-Generation Smart Grid Cybersecurity: A Systematic Review of OT Cyber Threats, AI-Driven Defense, Cyber Deception Techniques, and Emerging Security Strategies

open access: yesIEEE Access
The swift modernization of conventional power grids into smart grids has substantially increased their attack surface, making them vulnerable to advanced cyber threats.
Hind Lakhal   +2 more
doaj   +1 more source

Cyber threat intelligence sharing platforms

open access: yes, 2021
The use of threat intelligence to improve the cybersecurity of organizations is on the rise. Cyber-attacks are steadily increasing and becoming more sophisticated. Threat intelligence and threat intelligence sharing play a critical role in combating cyber-crime.
openaire   +1 more source

Guide to Australia’s national security capability [PDF]

open access: yes
This paper provides a single consolidated picture of the capabilities that enable Australia to achieve national security outcomes in a range of environments, including domestically, at the border, offshore and in cyberspace.

core  

Modeling Cyber Threat Intelligence

open access: yesProceedings of the 6th International Conference on Information Systems Security and Privacy, 2020
Fredrik Borg   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy