Results 101 to 110 of about 2,089 (203)

Evolving ML-Based Intrusion Detection: Cyber Threat Intelligence for Dynamic Model Updates

open access: yesIEEE Transactions on Machine Learning in Communications and Networking
Existing Intrusion Detection System (IDS) relies on pre-trained models that struggle to keep pace with the evolving nature of network threats, as they cannot detect new types of network attacks until updated.
Ying-Dar Lin   +5 more
doaj   +1 more source

A Methodology for Developing & Assessing CTI Quality Metrics

open access: yesIEEE Access
Since its first steps in the cybersecurity field, Cyber Threat Intelligence (CTI) has gained recognition and increased its importance in the daily operations of cybersecurity teams.
Georgios Sakellariou   +2 more
doaj   +1 more source

TrustShare: Secure and Trusted Blockchain Framework for Threat Intelligence Sharing

open access: yesFuture Internet
We introduce TrustShare, a novel blockchain-based framework designed to enable secure, privacy-preserving, and trust-aware cyber threat intelligence (CTI) sharing across organizational boundaries.
Hisham Ali   +5 more
doaj   +1 more source

Hafnium and the zero-day dilemma. Public-private cyber threat intelligence cooperation

open access: yesBulletin of "Carol I" National Defense University
Cyber threat intelligence (CTI) plays a crucial role in limiting cybersecurity risks, with a particular focus on identifying and mitigating zero-day vulnerabilities.
Mihai OLTEANU
doaj   +1 more source

Applying Cyber Threat Intelligence to Industrial Control Systems [PDF]

open access: yes, 2017
A cybersecurity initiative known as cyber threat intelligence (CTI) has recently been developed and deployed. The overall goal of this new technology is to help protect network infrastructures.
Sibiga, Matthew P.
core   +1 more source

Multi-Step LLM Pipeline for Enhancing TTP Extraction in Cyber Threat Intelligence

open access: yesIEEE Access
Tactics, techniques, and procedures (TTPs) are essential for modeling adversary behavior and supporting cyber defense operations. Despite their importance, most cyber threat intelligence (CTI) is provided in unstructured formats, making automated TTP ...
Hyoung Rok Kim   +4 more
doaj   +1 more source

Improving Multi-Class Classification for Recognition of the Prioritized Classes Using the Analytic Hierarchy Process

open access: yesApplied Sciences
Machine learning (ML) algorithms are widely used in various fields, including cyber threat intelligence (CTI), financial technology (Fintech), and intrusion detection systems (IDSs). They automate security alert data analysis, enhancing attack detection,
Algimantas Venčkauskas   +2 more
doaj   +1 more source

Blockchain technology in Cyber Threat Intelligence: Applications and challenges [PDF]

open access: yes
The cyber threat landscape is becoming increasingly complex, which renders many reactive threat response protocols insufficient. Cyber Threat Intelligence (CTI) introduces a new paradigm to cybersecurity, shifting the focus toward proactive gathering ...
Välimaa, Sanni
core  

Few-shot relation extraction approach for threat intelligence based on multi-level attention mechanism and hybrid prototypical network

open access: yesArray
With the increasing complexity of cyberattacks, the frequency and severity of cybersecurity incidents have escalated dramatically. Cyber Threat Intelligence (CTI) relation extraction plays a critical role in cybersecurity event analysis by identifying ...
Yushun Xie   +4 more
doaj   +1 more source

To Strengthen the Cybersecurity Posture of SACCOs in Kenya by Assessing Current Practices, Developing a CTI Sharing Platform, And Formulating Supportive Policy Guidelines [PDF]

open access: yes
The study investigated to strengthen the cybersecurity posture of SACCOs in Kenya by assessing current practices, developing a CTI sharing platform, and formulating supportive policy guidelines and was based on the following research objective: Creating ...
Angolo, Shem Mbandu   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy