Results 21 to 30 of about 2,124 (200)

Secure aggregation of sufficiently many private inputs [PDF]

open access: yesFrontiers in Big Data
Secure aggregation of distributed inputs is a well-studied problem. In this study, anonymity of inputs is achieved by assuring a minimal quota before publishing the outcome.
Thijs Veugen   +3 more
doaj   +2 more sources

EDAER: Entropy-Driven Approach for Entity and Relation Extraction in Chinese Cyber Threat Intelligence [PDF]

open access: yesEntropy
Cyber threat intelligence (CTI) has been explored to strengthen system security via taking raw threat data from various data sources and transforming it into actionable insights that enable organizations to predict, detect, and respond to cyber threats ...
Yong Li   +6 more
doaj   +2 more sources

BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture [PDF]

open access: yesScientific Reports
The exponential growth of sophisticated cyber threats in Internet of Things (IoT) environments has exposed fundamental weaknesses in existing Cyber Threat Intelligence (CTI) platforms, including centralized architectures, trust deficits, privacy ...
Alaa Tolah
doaj   +2 more sources

Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]

open access: yesJournal of Universal Computer Science, 2019
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj   +3 more sources

Measuring and visualizing cyber threat intelligence quality [PDF]

open access: yes, 2020
The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of ...
Böhm, Fabian   +3 more
core   +1 more source

Computer crime motives: Do we have it right?

open access: yesSociology Compass, Volume 17, Issue 4, April 2023., 2023
Abstract Academic, legal and practitioner responses to cyber threats have been predominantly reactive, punitive, and deterrence‐based, with limited attention given to the motives underlying computer criminals' behaviors. This paper reasons that new and better theoretical perspectives are needed to explain computer criminals' motives. Following a review
Derrick Neufeld
wiley   +1 more source

Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is collected, processed, analysed, and disseminated to the right audience, in order to comprehend a malicious threat actor’s motivation, goals, objectives, targets, and attack behaviours.
Dimitrios Chatziamanetoglou   +2 more
wiley   +1 more source

SecTKG: A Knowledge Graph for Open‐Source Security Tools

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
As the complexity of cyberattacks continues to increase, multistage combination attacks have become the primary method of attack. Attackers plan and organize a series of attack steps, using various attack tools to achieve specific goals. Extracting knowledge about these tools is of great significance for both defense and tracing of attacks.
Siqi Sun   +4 more
wiley   +1 more source

Intelligent protection coordination restoration strategy for active distribution networks

open access: yesIET Generation, Transmission &Distribution, Volume 16, Issue 3, Page 397-413, February 2022., 2022
Abstract Despite various advantages of integrating distributed generation (DG) units into distribution networks such as power loss reduction and voltage profile improvement, they may disrupt the performance of the conventional protection system due to bidirectional power flow and change of short‐circuit power.
Mahmoud Hojjaty   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy