Results 11 to 20 of about 2,124 (200)

Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment [PDF]

open access: yesRisk Analysis, Volume 46, Issue 1, January 2026.
ABSTRACT Recent government and commercial initiatives have pushed for the use of the automated, artificial intelligence (AI)–based, analysis of cyber threat intelligence. The potential bias that might be present when evaluating threat intelligence coming from human and AI sources has to be better understood before deploying automated solutions to ...
Sarah van Gerwen   +3 more
wiley   +2 more sources

A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats [PDF]

open access: yesSensors
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify ...
Pedro Santos   +4 more
doaj   +2 more sources

Cyber threat attribution using unstructured reports in cyber threat intelligence

open access: yesEgyptian Informatics Journal, 2023
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj   +3 more sources

A dataset for cyber threat intelligence modeling of connected autonomous vehicles [PDF]

open access: yesScientific Data
Cyber attacks pose significant threats to connected autonomous vehicles in intelligent transportation systems. Cyber threat intelligence (CTI), which involves collecting and analyzing cyber threat information, offers a promising approach to addressing ...
Yinghui Wang   +5 more
doaj   +2 more sources

Cyberattack event and arguments extraction based on feature interaction and few-shot learning [PDF]

open access: yesScientific Reports
Cyber Threat Intelligence (CTI) serves as a crucial indicator of cybersecurity events, providing critical evidence for analyzing cyberattacks and vulnerabilities.
Yue Han   +3 more
doaj   +2 more sources

Integrating CTI and threat modeling for cyber resilience: An AHP assessment. [PDF]

open access: yesPLoS ONE
Cyber resilience has emerged as a critical objective for modern cybersecurity programs, emphasizing not only prevention but also the ability to anticipate, withstand, recover from, and adapt to cyber threats.
Luka Podlesnik   +2 more
doaj   +2 more sources

AAPM working group on cybersecurity report 438: A white paper on cybersecurity management for business continuity in radiology and radiation therapy [PDF]

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 12, December 2025.
Abstract A growing number of clinics have experienced disruptions of clinical services due to cyberattacks. To provide continuity of care, medical physicists should work with Information Technology (IT) staff to develop a business continuity plan.
R. Alfredo Siochi   +7 more
wiley   +2 more sources

Cyber threat intelligence sharing: Survey and research directions [PDF]

open access: yesComputers and Security, 2019
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process of CTI sharing, and even the basic consumption, has raised new challenges for ...
Abouzahra   +102 more
core   +3 more sources

Integrating AI in security information and event management for real time cyber defense [PDF]

open access: yesScientific Reports
The increasing frequency and sophistication of cyber-attacks have exposed significant shortcomings in conventional detection systems, emphasizing the urgent need for more advanced Cyber Threat Intelligence (CTI) capabilities.
Salman Khan   +4 more
doaj   +2 more sources

Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning [PDF]

open access: yesSensors, 2022
Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications to accomplish their daily tasks. However, many of these applications are either
Mohammed Alsaedi   +4 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy