Results 11 to 20 of about 2,089 (203)

Formulation Of Association Rule Mining (ARM) For An Effective Cyber Attack Attribution In Cyber Threat Intelligence (CTI) [PDF]

open access: yesInternational Journal of Advanced Computer Science and Applications, 2021
In recent year, an adversary has improved their Tactic, Technique and Procedure (TTPs) in launching cyberattack that make it less predictable, more persistent, resourceful and better funded. So many organisation has opted to use Cyber Threat Intelligence
Abu, Md Sahrom   +3 more
core   +3 more sources

BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture [PDF]

open access: yesScientific Reports
The exponential growth of sophisticated cyber threats in Internet of Things (IoT) environments has exposed fundamental weaknesses in existing Cyber Threat Intelligence (CTI) platforms, including centralized architectures, trust deficits, privacy ...
Alaa Tolah
doaj   +2 more sources

TrustFed-CTI: A Trust-Aware Federated Learning Framework for Privacy-Preserving Cyber Threat Intelligence Sharing Across Distributed Organizations

open access: yesFuture Internet
The rapid evolution of cyber threats requires intelligence sharing between organizations while ensuring data privacy and contributor credibility. Existing centralized cyber threat intelligence (CTI) systems suffer from single points of failure, privacy ...
Manel Mrabet
doaj   +2 more sources

MAD-CTI: Cyber Threat Intelligence Analysis of the Dark Web Using a Multi-Agent Framework

open access: yesIEEE Access
The dark web is a host to illicit activities where hacker forums, blogs, and articles provide significant insights into Cyber Threat Intelligence (CTI) that are frequently unavailable on the surface web.
Sayuj Shah, Vijay K. Madisetti
doaj   +2 more sources

Algorithm Perception When Using Threat Intelligence in Vulnerability Risk Assessment. [PDF]

open access: yesRisk Anal
ABSTRACT Recent government and commercial initiatives have pushed for the use of the automated, artificial intelligence (AI)–based, analysis of cyber threat intelligence. The potential bias that might be present when evaluating threat intelligence coming from human and AI sources has to be better understood before deploying automated solutions to ...
van Gerwen S   +3 more
europepmc   +2 more sources

An Automatic Generation Approach of the Cyber Threat Intelligence Records Based on Multi-Source Information Fusion

open access: yesFuture Internet, 2021
With the progressive deterioration of cyber threats, collecting cyber threat intelligence (CTI) from open-source threat intelligence publishing platforms (OSTIPs) can help information security personnel grasp public opinions with specific pertinence ...
Tianfang Sun   +3 more
doaj   +1 more source

Actionable Intelligence-Oriented Cyber Threat Modeling Framework [PDF]

open access: yes, 2022
Amid the growing challenges of cybersecurity, the new paradigm of cyber threat intelligence (or CTI) has gained momentum to better deal with cyber threats.
Cameron, Lance   +4 more
core   +2 more sources

Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques

open access: yesCybernetics and Information Technologies, 2022
In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of previous incidents plays an important role by helping ...
Ejaz Sarwat, Noor Umara, Rashid Zahid
doaj   +1 more source

SECDFAN: A Cyber Threat Intelligence System for Discussion Forums Utilization

open access: yesEng, 2023
Cyber Threat intelligence (CTI) systems offer new capabilities in the arsenal of information security experts, who can explore new sources of data that were partially exploited during the past decades. This paper deals with the exploitation of discussion
Georgios Sakellariou   +2 more
doaj   +1 more source

A Reference Model for Cyber Threat Intelligence (CTI) Systems

open access: yesElectronics, 2022
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with many organizations investing in the development of proper tools and services and the integration of CTI related information. However, as a new field, there is a lack of a conceptual framework with corresponding definitions.
Georgios Sakellariou   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy