Results 101 to 110 of about 2,089 (203)
Evolving ML-Based Intrusion Detection: Cyber Threat Intelligence for Dynamic Model Updates
Existing Intrusion Detection System (IDS) relies on pre-trained models that struggle to keep pace with the evolving nature of network threats, as they cannot detect new types of network attacks until updated.
Ying-Dar Lin +5 more
doaj +1 more source
A Methodology for Developing & Assessing CTI Quality Metrics
Since its first steps in the cybersecurity field, Cyber Threat Intelligence (CTI) has gained recognition and increased its importance in the daily operations of cybersecurity teams.
Georgios Sakellariou +2 more
doaj +1 more source
TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing
We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries.
Hisham Ali +5 more
doaj +1 more source
Hafnium and the zero-day dilemma. Public-private cyber threat intelligence cooperation
Cyber threat intelligence (CTI) plays a crucial role in limiting cybersecurity risks, with a particular focus on identifying and mitigating zero-day vulnerabilities.
Mihai OLTEANU
doaj +1 more source
Applying Cyber Threat Intelligence to Industrial Control Systems [PDF]
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures.
Sibiga, Matthew P.
core +1 more source
Multi-Step LLM Pipeline for Enhancing TTP Extraction in Cyber Threat Intelligence
Tactics, techniques, and procedures (TTPs) are essential for modeling adversary behavior and supporting cyber defense operations. Despite their importance, most cyber threat intelligence (CTI) is provided in unstructured formats, making automated TTP ...
Hyoung Rok Kim +4 more
doaj +1 more source
Machine learning (ML) algorithms are widely used in various fields, including cyber threat intelligence (CTI), financial technology (Fintech), and intrusion detection systems (IDSs). They automate security alert data analysis, enhancing attack detection,
Algimantas Venčkauskas +2 more
doaj +1 more source
Blockchain technology in Cyber Threat Intelligence: Applications and challenges [PDF]
The cyber threat landscape is becoming increasingly complex, which renders many reactive threat response protocols insufficient. Cyber Threat Intelligence (CTI) introduces a new paradigm to cybersecurity, shifting the focus toward proactive gathering ...
Välimaa, Sanni
core
With the increasing complexity of cyberattacks, the frequency and severity of cybersecurity incidents have escalated dramatically. Cyber Threat Intelligence (CTI) relation extraction plays a critical role in cybersecurity event analysis by identifying ...
Yushun Xie +4 more
doaj +1 more source
To Strengthen the Cybersecurity Posture of SACCOs in Kenya by Assessing Current Practices, Developing a CTI Sharing Platform, And Formulating Supportive Policy Guidelines [PDF]
The study investigated to strengthen the cybersecurity posture of SACCOs in Kenya by assessing current practices, developing a CTI sharing platform, and formulating supportive policy guidelines and was based on the following research objective: Creating ...
Angolo, Shem Mbandu +2 more
core +1 more source

