Results 151 to 160 of about 2,089 (203)

A hierarchical deep learning framework with doubly regularized loss for robust malware detection and family categorization. [PDF]

open access: yesSci Rep
Abed Alsaedi S   +6 more
europepmc   +1 more source

Lightweight malicious URL detection using deep learning and large language models. [PDF]

open access: yesSci Rep
Kibriya H   +5 more
europepmc   +1 more source

IoT Forensics: Current Perspectives and Future Directions. [PDF]

open access: yesSensors (Basel)
Ahmed AA   +4 more
europepmc   +1 more source

Detecting lateral movement: A systematic survey. [PDF]

open access: yesHeliyon
Smiliotopoulos C   +2 more
europepmc   +1 more source
Some of the next articles are maybe not open access.

Related searches:

How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning

2022
Cyber threat intelligence (CTI) has emerged as a critical pillar in a well-developed cyber security strategy. When used correctly, threat information may assist security teams in defending against an ever-more sophisticated threat landscape before, during, and after an attack.
Neelima Kant, null Amrita
openaire   +1 more source

Dark-Net Ecosystem Cyber-Threat Intelligence (CTI) Tool

2019 IEEE International Conference on Intelligence and Security Informatics (ISI), 2019
The frequency and costs of cyber-attacks are increasing each year. By the end of 2019, the total cost of data breaches is expected to reach $2.1 trillion through the ever-growing online presence of enterprises and their consumers. The tools to perform these attacks and the breached data can often be purchased within the Dark-net.
Nolan Arnold   +6 more
openaire   +1 more source

Home - About - Disclaimer - Privacy