Results 31 to 40 of about 2,089 (203)

TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network

open access: yesCybersecurity, 2022
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of compromise (IOCs), e.g., malware hash or URL (uniform resource locator) of command and control server.
Jian Liu   +7 more
doaj   +1 more source

Cyber Threat Intelligence – Issue and Challenges [PDF]

open access: yes, 2018
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before.
Ariffin, Aswami   +3 more
core   +3 more sources

Your WAP Is at Risk: A Vulnerability Analysis on Wireless Access Point Web‐Based Management Interfaces

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
This work provides an answer to the following key question: Are the Web‐based management interfaces of the contemporary off‐the‐shelf wireless access points (WAP) free of flaws and vulnerabilities? The short answer is not very much. That is, after performing a vulnerability assessment on the Web interfaces of six different WAPs by an equal number of ...
Efstratios Chatzoglou   +3 more
wiley   +1 more source

Towards Cyber Threat Intelligence for the IoT

open access: yes, 2023
With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization's threat mitigation strategy. This Cyber Threat Intelligence (CTI) is
Butun, Ismail   +3 more
core   +1 more source

Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution

open access: yesWireless Communications and Mobile Computing, Volume 2022, Issue 1, 2022., 2022
Threat modeling and simulation (TMS) was aimed at dynamically capturing the features of attacks, which is a challenging job in complex Industrial Internet of Things (IIoT) control systems due to the complicated relationships among attacks. Recently, Meta Attack Language (MAL) showed its powerful TMS capabilities for representing complex attacks ...
Shuqin Zhang   +8 more
wiley   +1 more source

Healthcare Security Incident Response Strategy ‐ A Proactive Incident Response (IR) Procedure

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, missing the opportunities to foresee danger on the horizon.
Ying He   +4 more
wiley   +1 more source

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Increasingly, cyber security personnel are using cyber deception defense techniques to deal with network intrusions. However, traditional cyber deception techniques (such as honeypots and honeynets) are easily detected by attackers, thus leading to failure.
Chungang Gao   +3 more
wiley   +1 more source

Basic concepts, approaches and fundamentals of cyber threat intelligence [PDF]

open access: yes, 2022
This article is designed to introduce readers to Cyber Threat Intelligence (CTI). Various Threat Hunting (TH) techniques and sources of information about threats were mentioned.
Kozlenko, Oleh, Makovska, Maryna
core   +1 more source

A Theoretical review on the importance of Threat Intelligence Sharing & The challenges intricated [PDF]

open access: yes, 2021
Cyber Threat Intelligence (CTI) is the emerging strategy of cyber defense which helps organizations to combat the latest and more sophisticated cyber threats. Gathering this threat information, analyzing and communicating it between the security teams is
et.al, Sandhya Sukhabogi
core   +1 more source

Home - About - Disclaimer - Privacy