Results 91 to 100 of about 2,124 (200)

Development of a Machine Learning-Based Cyber Threat Intelligence Dashboard System for Strategic Operations Centre [PDF]

open access: yes
Cyber Threat Intelligence (CTI) has become an essential element in the toolkit of Cybersecurity experts. In recent years, the significance of CTI has grown exponentially due to the increasing sophistication and frequency of cyber attacks.
Alhassan, J. K.   +3 more
core   +1 more source

CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning [PDF]

open access: yes
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two ...
Ahmed, Kashan   +2 more
core   +2 more sources

Publication Only

open access: yes
HemaSphere, Volume 9, Issue S1, June 2025.
wiley   +1 more source

The Use of Large Language Models (LLM) for Cyber Threat Intelligence (CTI) in Cybercrime Forums

open access: yes
Large language models (LLMs) can be used to analyze cyber threat intelligence (CTI) data from cybercrime forums, which contain extensive information and key discussions about emerging cyber threats. However, to date, the level of accuracy and efficiency of LLMs for such critical tasks has yet to be thoroughly evaluated.
Clairoux-Trepanier, Vanessa   +5 more
openaire   +2 more sources

Research on Discovery and Mapping of ATT&CK Tactics and Techniques by Cyber Threat Intelligence Based on BERT-TextCNN

open access: yesIEEE Access
Cyber Threat Intelligence (CTI) serves as a critical component in modern cybersecurity. Nevertheless, the different writing styles and lack of standardization in CTI documentation impose significant interpretation overhead on security analysts.
Shuqin Zhang, Dedong Li, Jun Li
doaj   +1 more source

Application of machine learning on cyber threat intelligence data [PDF]

open access: yes
Cybersecurity stands as a paramount concern in today’s digital landscape, with the proliferation of cyber threats posing significant risks to individuals, organizations, and governments worldwide.
Hasan, Asad
core  

Towards a Threat Intelligence Informed Digital Forensics Readiness Framework [PDF]

open access: yes, 2017
Digital Forensic Readiness (DFR) has received little attention by the research community, when compared to the core digital forensic investigation processes.
Baltatzis, D.   +4 more
core  

MLDSJ: a multi-level feature joint attribution method for APT group based on threat intelligence

open access: yesEURASIP Journal on Information Security
Advanced persistent threat (APT) attribution is a key defense strategy that can effectively safeguard the security of critical assets and systems. Cyber threat intelligence (CTI) contains rich information about APT groups that can be leveraged for ...
Longxuan Duan, Mi Wen, Yun Xiong
doaj   +1 more source

Cyber Threat Intelligence on Blockchain: A Systematic Literature Review

open access: yesComputers
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding organizations against cyber threats. However, managing, storing, analyzing, and sharing vast and sensitive threat intelligence data is a challenge.
Dimitrios Chatziamanetoglou   +1 more
doaj   +1 more source

Cyber threat intelligence for smart grids using knowledge graphs, digital twins, and hybrid machine learning in SCADA networks

open access: yesInternational Journal of Engineering Business Management
In the SCADA (Supervisory Control and Data Acquisition) network of a smart grid, the network switch is connected to multiple Intelligent Electronic Devices (IEDs) that are based on protective relays.
Nabeel Al-Qirim   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy