Results 91 to 100 of about 2,089 (203)
Cyber Threat Intelligence (CTI) serves as a critical component in modern cybersecurity. Nevertheless, the different writing styles and lack of standardization in CTI documentation impose significant interpretation overhead on security analysts.
Shuqin Zhang, Dedong Li, Jun Li
doaj +1 more source
Application of machine learning on cyber threat intelligence data [PDF]
Cybersecurity stands as a paramount concern in today’s digital landscape, with the proliferation of cyber threats posing significant risks to individuals, organizations, and governments worldwide.
Hasan, Asad
core
The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums
Large language models (LLMs) can be used to analyze cyber threat intelligence (CTI) data from cybercrime forums, which contain extensive information and key discussions about emerging cyber threats. However, to date, the level of accuracy and efficiency of LLMs for such critical tasks has yet to be thoroughly evaluated.
Clairoux-Trepanier, Vanessa +5 more
openaire +2 more sources
Towards a Threat Intelligence Informed Digital Forensics Readiness Framework [PDF]
Digital Forensic Readiness (DFR) has received little attention by the research community, when compared to the core digital forensic investigation processes.
Baltatzis, D. +4 more
core
MLDSJ: a multi-level feature joint attribution method for APT group based on threat intelligence
Advanced persistent threat (APT) attribution is a key defense strategy that can effectively safeguard the security of critical assets and systems. Cyber threat intelligence (CTI) contains rich information about APT groups that can be leveraged for ...
Longxuan Duan, Mi Wen, Yun Xiong
doaj +1 more source
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding organizations against cyber threats. However, managing, storing, analyzing, and sharing vast and sensitive threat intelligence data is a challenge.
Dimitrios Chatziamanetoglou +1 more
doaj +1 more source
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim +3 more
doaj +1 more source
Tactics, Techniques and Procedures (TTPs) to Augment Cyber Threat Intelligence (CTI): A Comprehensive Study [PDF]
Sharing Threat Intelligence is now one of the biggest trends in cyber security industry. Today, no one can deny the necessity for information sharing to fight the cyber battle.
Shahi, Mohammad Ashraful Huq
core +1 more source
FeedMeter : evaluating the quality of community-driven threat intelligence [PDF]
A sound understanding of the adversary in the form of cyber threat intelligence (CTI) is key to successful cyber defense. Various sources of CTI exist, however there is no state-of-the-art method to approximate feed quality in an automated and continuous
Happe, Markus +6 more
core +1 more source

