Results 91 to 100 of about 2,124 (200)
Development of a Machine Learning-Based Cyber Threat Intelligence Dashboard System for Strategic Operations Centre [PDF]
Cyber Threat Intelligence (CTI) has become an essential element in the toolkit of Cybersecurity experts. In recent years, the significance of CTI has grown exponentially due to the increasing sophistication and frequency of cyber attacks.
Alhassan, J. K. +3 more
core +1 more source
CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning [PDF]
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two ...
Ahmed, Kashan +2 more
core +2 more sources
The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums
Large language models (LLMs) can be used to analyze cyber threat intelligence (CTI) data from cybercrime forums, which contain extensive information and key discussions about emerging cyber threats. However, to date, the level of accuracy and efficiency of LLMs for such critical tasks has yet to be thoroughly evaluated.
Clairoux-Trepanier, Vanessa +5 more
openaire +2 more sources
Cyber Threat Intelligence (CTI) serves as a critical component in modern cybersecurity. Nevertheless, the different writing styles and lack of standardization in CTI documentation impose significant interpretation overhead on security analysts.
Shuqin Zhang, Dedong Li, Jun Li
doaj +1 more source
Application of machine learning on cyber threat intelligence data [PDF]
Cybersecurity stands as a paramount concern in today’s digital landscape, with the proliferation of cyber threats posing significant risks to individuals, organizations, and governments worldwide.
Hasan, Asad
core
Towards a Threat Intelligence Informed Digital Forensics Readiness Framework [PDF]
Digital Forensic Readiness (DFR) has received little attention by the research community, when compared to the core digital forensic investigation processes.
Baltatzis, D. +4 more
core
MLDSJ: a multi-level feature joint attribution method for APT group based on threat intelligence
Advanced persistent threat (APT) attribution is a key defense strategy that can effectively safeguard the security of critical assets and systems. Cyber threat intelligence (CTI) contains rich information about APT groups that can be leveraged for ...
Longxuan Duan, Mi Wen, Yun Xiong
doaj +1 more source
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding organizations against cyber threats. However, managing, storing, analyzing, and sharing vast and sensitive threat intelligence data is a challenge.
Dimitrios Chatziamanetoglou +1 more
doaj +1 more source
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim +3 more
doaj +1 more source

