Results 111 to 120 of about 2,124 (200)

Few-shot relation extraction approach for threat intelligence based on multi-level attention mechanism and hybrid prototypical network

open access: yesArray
With the increasing complexity of cyberattacks, the frequency and severity of cybersecurity incidents have escalated dramatically. Cyber Threat Intelligence (CTI) relation extraction plays a critical role in cybersecurity event analysis by identifying ...
Yushun Xie   +4 more
doaj   +1 more source

Advancements in Open Source Intelligence (OSINT) Techniques and the role of artificial intelligence in Cyber Threat Intelligence (CTI)

open access: yes
This dissertation addresses the multilayered connection among Open Source Intelligence (OSINT), Artificial Intelligence (AI), and Cyber Threat Intelligence (CTI). Focused on the impact of AI on CTI and advancements in OSINT techniques, as well as how these two fields interact in order to reshape the realm of information gathering and security analysis.
openaire   +2 more sources

TRIDEnT: Building Decentralized Incentives for Collaborative Security

open access: yes, 2019
Sophisticated mass attacks, especially when exploiting zero-day vulnerabilities, have the potential to cause destructive damage to organizations and critical infrastructure.
Alexopoulos, Nikolaos   +4 more
core  

DISINFOX: A Threat Intelligence sharing platform for disinformation incidents [PDF]

open access: yes
Cyber Threat Intelligence (CTI) has empowered cybersecurity teams worldwide by improving the quality and speed of their analysis for cybersecurity incidents through the establishment standards and specialized tools.
Sánchez González, Felipe
core  

Home - About - Disclaimer - Privacy