Results 11 to 20 of about 2,089 (203)
Formulation Of Association Rule Mining (ARM) For An Effective Cyber Attack Attribution In Cyber Threat Intelligence (CTI) [PDF]
In recent year, an adversary has improved their Tactic, Technique and Procedure (TTPs) in launching cyberattack that make it less predictable, more persistent, resourceful and better funded. So many organisation has opted to use Cyber Threat Intelligence
Abu, Md Sahrom +3 more
core +3 more sources
BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture [PDF]
The exponential growth of sophisticated cyber threats in Internet of Things (IoT) environments has exposed fundamental weaknesses in existing Cyber Threat Intelligence (CTI) platforms, including centralized architectures, trust deficits, privacy ...
Alaa Tolah
doaj +2 more sources
The rapid evolution of cyber threats requires intelligence sharing between organizations while ensuring data privacy and contributor credibility. Existing centralized cyber threat intelligence (CTI) systems suffer from single points of failure, privacy ...
Manel Mrabet
doaj +2 more sources
MAD-CTI: Cyber Threat Intelligence Analysis of the Dark Web Using a Multi-Agent Framework
The dark web is a host to illicit activities where hacker forums, blogs, and articles provide significant insights into Cyber Threat Intelligence (CTI) that are frequently unavailable on the surface web.
Sayuj Shah, Vijay K. Madisetti
doaj +2 more sources
Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment. [PDF]
ABSTRACT Recent government and commercial initiatives have pushed for the use of the automated, artificial intelligence (AI)–based, analysis of cyber threat intelligence. The potential bias that might be present when evaluating threat intelligence coming from human and AI sources has to be better understood before deploying automated solutions to ...
van Gerwen S +3 more
europepmc +2 more sources
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence ...
Tianfang Sun +3 more
doaj +1 more source
Actionable Intelligence-Oriented Cyber Threat Modeling Framework [PDF]
Amid the growing challenges of cybersecurity, the new paradigm of cyber threat intelligence (or CTI) has gained momentum to better deal with cyber threats.
Cameron, Lance +4 more
core +2 more sources
Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj +1 more source
SECDFAN: A Cyber Threat Intelligence System for Discussion Forums Utilization
Cyber Threat intelligence (CTI) systems offer new capabilities in the arsenal of information security experts, who can explore new sources of data that were partially exploited during the past decades. This paper deals with the exploitation of discussion
Georgios Sakellariou +2 more
doaj +1 more source
A Reference Model for Cyber Threat Intelligence (CTI) Systems
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with many organizations investing in the development of proper tools and services and the integration of CTI related information. However, as a new field, there is a lack of a conceptual framework with corresponding definitions.
Georgios Sakellariou +3 more
openaire +1 more source

