Results 161 to 170 of about 2,089 (203)
Some of the next articles are maybe not open access.

CTI-Twitter: Gathering Cyber Threat Intelligence from Twitter using Integrated Supervised and Unsupervised Learning

2020 IEEE International Conference on Big Data (Big Data), 2020
Cyber threat intelligence (CTI) can be gathered from multiple sources, and Twitter is one such open source platform where a large volume and variety of threat data is shared every day. The automated and timely mining of relevant threat knowledge from this data can be crucial for enrichment of existing threat intelligence platforms to proactively defend
Linn-Mari Kristiansen   +3 more
openaire   +1 more source

Cyber Threat Intelligence (CTI): A Comprehensive Review of Automated Threat Intelligence Platforms, Dark Web Monitoring, and Threat Hunting

SPU- Journal of Science, Technology and Management Research
Cyber Threat Intelligence (CTI) is essential for proactive cybersecurity, enabling organizations to detect, analyze, and mitigate threats before they cause harm. This paper reviews CTI with a focus on Automated Threat Intelligence Platforms, Dark Web Monitoring, and Threat Hunting, synthesizing insights from over 40 research papers and industry reports.
Jinit S. Raval, Nitin Pandya, Jigar Soni
openaire   +1 more source

A Study on a Cyber Threat Intelligence Analysis (CTI) Platform for the Proactive Detection of Cyber Attacks Based on Automated Analysis

2018 International Conference on Platform Technology and Service (PlatCon), 2018
This paper proposes an automated cyberattack analysis platform that is designed to analyze and respond to cyberattacks, which are becoming ever more intelligent and advanced. The ICT information generated during previous cyberattacks will be collected to analyze cyberattacks automatically, and the relationship between the collected information, level ...
Byung Ik Kim   +4 more
openaire   +1 more source

Topic Modeling for Cyber Threat Intelligence (CTI)

2022 Seventh International Conference on Informatics and Computing (ICIC), 2022
Hatma Suryotrisongko   +4 more
openaire   +1 more source

On the Use of Cyber Threat Intelligence (CTI) in Support of Developing the Commander's Understanding of the Adversary

MILCOM 2019 - 2019 IEEE Military Communications Conference (MILCOM), 2019
Cyber Threat Intelligence (CTI) is a rapidly developing field which has evolved in direct response to exponential growth in cyber related crimes and attacks. CTI supports Communication and Information System (CIS)Security in order to bolster defenses and aids in the development of threat models that inform an organization's decision making process.
Manisha Parmar, Alberto Domingo
openaire   +1 more source

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)

IEEE Transactions on Dependable and Secure Computing, 2022
Sagar Samtani   +3 more
openaire   +1 more source

IAM Meets CTI: Make Identity and Access Management Ready for Cyber Threat Intelligence

Enterprises rely on Identity and Access Management (IAM) systems as their primary solution for digital identity management and access control. While regulatory compliance is often a driving factor for such systems, they also serve as an essential security gate fortifying the defense against cyber attacks.
Alexander Puchta   +3 more
openaire   +2 more sources

Malware incident response (IR) informed by cyber threat intelligence (CTI)

Science China Information Sciences, 2021
Ying He, Ellis Inglut, Cunjin Luo
openaire   +1 more source

Cyber threat intelligence: designing a method and sharing platform for CTI

As modern infrastructures face increasingly complex and persistent threats, organizations require the utilization of structured and timely threat intelligence. Cyber Threat Intelligence refers to the process of collecting, processing and interpreting information about malicious activity, in order to improve awareness and support effective decision ...
openaire   +1 more source

Integrating Behavioral Science and Cyber Threat Intelligence (CTI) to Counter Advanced Persistent Threats (APTs) and Reduce Human-Enabled Security Breaches

International Journal of Scientific Research and Modern Technology
As cyber threats become increasingly sophisticated, human factors remain one of the most exploited vulnerabilities in security breaches, particularly in the context of Advanced Persistent Threats (APTs). Traditional cybersecurity approaches focus on technological defenses, yet they often overlook the cognitive biases, social engineering tactics, and ...
Matthew Onuh Ijiga   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy