A Framework for Budget-Constrained Zero-Day Cyber Threat Mitigation: A Knowledge-Guided Reinforcement Learning Approach. [PDF]
Basak M, Shin GY.
europepmc +1 more source
ACO-tuned randomized decision tree for detecting cyber threats in mobile web applications. [PDF]
Aljohani A.
europepmc +1 more source
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. [PDF]
Ali H +7 more
europepmc +1 more source
A data-driven approach to prioritize MITRE ATT&CK techniques for active directory adversary emulation. [PDF]
Abo-Alian A, Youssef M, Badr NL.
europepmc +1 more source
Cyber Attack Detection for Self-Driving Vehicle Networks Using Deep Autoencoder Algorithms. [PDF]
Alsaade FW, Al-Adhaileh MH.
europepmc +1 more source
A review of threat modelling approaches for APT-style attacks. [PDF]
Tatam M +3 more
europepmc +1 more source
Applying the defense model to strengthen information security with artificial intelligence in computer networks of the financial services sector. [PDF]
Karn AL +7 more
europepmc +1 more source
Analysis and implementation of semi-automatic model for vulnerability exploitations of threat agents in NIST databases. [PDF]
Sharma G, Vidalis S, Menon C, Anand N.
europepmc +1 more source
Large Language Models for Synthetic Dataset Generation of Cybersecurity Indicators of Compromise. [PDF]
Almorjan A, Basheri M, Almasre M.
europepmc +1 more source
Graph neural networks embedded with domain knowledge for cyber threat intelligence entity and relationship mining. [PDF]
Liu G, Lu K, Pi S.
europepmc +1 more source

