Results 1 to 10 of about 2,030 (149)

Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience [PDF]

open access: yesBig Data and Cognitive Computing, 2022
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj   +8 more sources

Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security [PDF]

open access: yesIEEE Access, 2021
Cyber Supply Chain (CSC) system is complex which involves different sub-systems performing various tasks. Security in supply chain is challenging due to the inherent vulnerabilities and threats from any part of the system which can be exploited at any ...
Abel Yeboah-Ofori   +6 more
doaj   +4 more sources

A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats [PDF]

open access: yesSensors
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify ...
Pedro Santos   +4 more
doaj   +2 more sources

A dataset for cyber threat intelligence modeling of connected autonomous vehicles [PDF]

open access: yesScientific Data
Cyber attacks pose significant threats to connected autonomous vehicles in intelligent transportation systems. Cyber threat intelligence (CTI), which involves collecting and analyzing cyber threat information, offers a promising approach to addressing ...
Yinghui Wang   +5 more
doaj   +2 more sources

Cyberattack event and arguments extraction based on feature interaction and few-shot learning [PDF]

open access: yesScientific Reports
Cyber Threat Intelligence (CTI) serves as a crucial indicator of cybersecurity events, providing critical evidence for analyzing cyberattacks and vulnerabilities.
Yue Han   +3 more
doaj   +2 more sources

Integrating CTI and threat modeling for cyber resilience: An AHP assessment. [PDF]

open access: yesPLoS ONE
Cyber resilience has emerged as a critical objective for modern cybersecurity programs, emphasizing not only prevention but also the ability to anticipate, withstand, recover from, and adapt to cyber threats.
Luka Podlesnik   +2 more
doaj   +2 more sources

Integrating AI in security information and event management for real time cyber defense [PDF]

open access: yesScientific Reports
The increasing frequency and sophistication of cyber-attacks have exposed significant shortcomings in conventional detection systems, emphasizing the urgent need for more advanced Cyber Threat Intelligence (CTI) capabilities.
Salman Khan   +4 more
doaj   +2 more sources

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning [PDF]

open access: yesSensors, 2022
Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications to accomplish their daily tasks. However, many of these applications are either
Mohammed Alsaedi   +4 more
doaj   +2 more sources

A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience [PDF]

open access: yesSensors, 2023
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target business data and system resources. Cyber threat intelligence (CTI) enhances organizational cybersecurity resilience by obtaining, processing, evaluating, and ...
Saqib Saeed   +4 more
doaj   +2 more sources

Secure aggregation of sufficiently many private inputs [PDF]

open access: yesFrontiers in Big Data
Secure aggregation of distributed inputs is a well-studied problem. In this study, anonymity of inputs is achieved by assuring a minimal quota before publishing the outcome.
Thijs Veugen   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy