Results 81 to 90 of about 79,970 (188)
The increasing complexity and scale of cyber threats have pushed Cyber Threat Intelligence (CTI) beyond the capabilities of traditional rule-based systems.
Mateo Barrios-González +3 more
doaj +1 more source
IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data
In the dynamic landscape of cyberspace, organizations face a myriad of coordinated advanced threats that challenge the traditional defense paradigm. Cyber Threat Intelligence (CTI) plays a crucial role, providing in-depth insights into adversary groups ...
Xiayu Xiang +4 more
doaj +1 more source
Unified cyber threat intelligence
Ao longo dos anos, a preocupação com a Ciber Seguranc¸a (a proteção de sistemas, redes e de informações num ciber espaço) nas grandes empresas tem vindo a aumentar, isto porque, atualmente a maioria das organizações depende de dados informatizados e partilham grandes quantidades de informação por todo o globo, tornando-se em alvos mais fáceis para ...
openaire +1 more source
NLP-based techniques for Cyber Threat Intelligence
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior.
Marco Arazzi +6 more
openaire +2 more sources
The swift modernization of conventional power grids into smart grids has substantially increased their attack surface, making them vulnerable to advanced cyber threats.
Hind Lakhal +2 more
doaj +1 more source
Cyber threat intelligence sharing platforms
The use of threat intelligence to improve the cybersecurity of organizations is on the rise. Cyber-attacks are steadily increasing and becoming more sophisticated. Threat intelligence and threat intelligence sharing play a critical role in combating cyber-crime.
openaire +1 more source
Guide to Australia’s national security capability [PDF]
This paper provides a single consolidated picture of the capabilities that enable Australia to achieve national security outcomes in a range of environments, including domestically, at the border, offshore and in cyberspace.
core
Modeling Cyber Threat Intelligence
Fredrik Borg +4 more
openaire +1 more source

