Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment [PDF]
ABSTRACT Recent government and commercial initiatives have pushed for the use of the automated, artificial intelligence (AI)–based, analysis of cyber threat intelligence. The potential bias that might be present when evaluating threat intelligence coming from human and AI sources has to be better understood before deploying automated solutions to ...
Sarah van Gerwen +3 more
wiley +2 more sources
A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats [PDF]
Cyber threat intelligence (CTI) has become critical in enhancing cybersecurity measures across various sectors. This systematic review aims to synthesize the current literature on the effectiveness of CTI strategies in mitigating cyber attacks, identify ...
Pedro Santos +4 more
doaj +2 more sources
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj +3 more sources
A dataset for cyber threat intelligence modeling of connected autonomous vehicles [PDF]
Cyber attacks pose significant threats to connected autonomous vehicles in intelligent transportation systems. Cyber threat intelligence (CTI), which involves collecting and analyzing cyber threat information, offers a promising approach to addressing ...
Yinghui Wang +5 more
doaj +2 more sources
Cyberattack event and arguments extraction based on feature interaction and few-shot learning [PDF]
Cyber Threat Intelligence (CTI) serves as a crucial indicator of cybersecurity events, providing critical evidence for analyzing cyberattacks and vulnerabilities.
Yue Han +3 more
doaj +2 more sources
Integrating CTI and threat modeling for cyber resilience: An AHP assessment. [PDF]
Cyber resilience has emerged as a critical objective for modern cybersecurity programs, emphasizing not only prevention but also the ability to anticipate, withstand, recover from, and adapt to cyber threats.
Luka Podlesnik +2 more
doaj +2 more sources
AAPM working group on cybersecurity report 438: A white paper on cybersecurity management for business continuity in radiology and radiation therapy [PDF]
Abstract A growing number of clinics have experienced disruptions of clinical services due to cyberattacks. To provide continuity of care, medical physicists should work with Information Technology (IT) staff to develop a business continuity plan.
R. Alfredo Siochi +7 more
wiley +2 more sources
Cyber threat intelligence sharing: Survey and research directions [PDF]
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process of CTI sharing, and even the basic consumption, has raised new challenges for ...
Abouzahra +102 more
core +3 more sources
Integrating AI in security information and event management for real time cyber defense [PDF]
The increasing frequency and sophistication of cyber-attacks have exposed significant shortcomings in conventional detection systems, emphasizing the urgent need for more advanced Cyber Threat Intelligence (CTI) capabilities.
Salman Khan +4 more
doaj +2 more sources
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning [PDF]
Web applications have become ubiquitous for many business sectors due to their platform independence and low operation cost. Billions of users are visiting these applications to accomplish their daily tasks. However, many of these applications are either
Mohammed Alsaedi +4 more
doaj +2 more sources

