Results 91 to 100 of about 2,089 (203)

Publication Only

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

Research on Discovery and Mapping of ATT&CK Tactics and Techniques by Cyber Threat Intelligence Based on BERT-TextCNN

open access: yesIEEE Access
Cyber Threat Intelligence (CTI) serves as a critical component in modern cybersecurity. Nevertheless, the different writing styles and lack of standardization in CTI documentation impose significant interpretation overhead on security analysts.
Shuqin Zhang, Dedong Li, Jun Li
doaj   +1 more source

Application of machine learning on cyber threat intelligence data [PDF]

open access: yes
Cybersecurity stands as a paramount concern in today’s digital landscape, with the proliferation of cyber threats posing significant risks to individuals, organizations, and governments worldwide.
Hasan, Asad
core  

The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums

open access: yes
Large language models (LLMs) can be used to analyze cyber threat intelligence (CTI) data from cybercrime forums, which contain extensive information and key discussions about emerging cyber threats. However, to date, the level of accuracy and efficiency of LLMs for such critical tasks has yet to be thoroughly evaluated.
Clairoux-Trepanier, Vanessa   +5 more
openaire   +2 more sources

Towards a Threat Intelligence Informed Digital Forensics Readiness Framework [PDF]

open access: yes, 2017
Digital Forensic Readiness (DFR) has received little attention by the research community, when compared to the core digital forensic investigation processes.
Baltatzis, D.   +4 more
core  

MLDSJ: a multi-level feature joint attribution method for APT group based on threat intelligence

open access: yesEURASIP Journal on Information Security
Advanced persistent threat (APT) attribution is a key defense strategy that can effectively safeguard the security of critical assets and systems. Cyber threat intelligence (CTI) contains rich information about APT groups that can be leveraged for ...
Longxuan Duan, Mi Wen, Yun Xiong
doaj   +1 more source

Cyber Threat Intelligence on Blockchain: A Systematic Literature Review

open access: yesComputers
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding organizations against cyber threats. However, managing, storing, analyzing, and sharing vast and sensitive threat intelligence data is a challenge.
Dimitrios Chatziamanetoglou   +1 more
doaj   +1 more source

Cyber threat intelligence for smart grids using knowledge graphs, digital twins, and hybrid machine learning in SCADA networks

open access: yesInternational Journal of Engineering Business Management
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim   +3 more
doaj   +1 more source

Tactics, Techniques and Procedures (TTPs) to Augment Cyber Threat Intelligence (CTI): A Comprehensive Study [PDF]

open access: yes, 2018
Sharing Threat Intelligence is now one of the biggest trends in cyber security industry. Today, no one can deny the necessity for information sharing to fight the cyber battle.
Shahi, Mohammad Ashraful Huq
core   +1 more source

FeedMeter : evaluating the quality of community-driven threat intelligence [PDF]

open access: yes
A sound understanding of the adversary in the form of cyber threat intelligence (CTI) is key to successful cyber defense. Various sources of CTI exist, however there is no state-of-the-art method to approximate feed quality in an automated and continuous
Happe, Markus   +6 more
core   +1 more source

Home - About - Disclaimer - Privacy