Results 31 to 40 of about 2,089 (203)
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of compromise (IOCs), e.g., malware hash or URL (uniform resource locator) of command and control server.
Jian Liu +7 more
doaj +1 more source
Cyber Threat Intelligence – Issue and Challenges [PDF]
Today threat landscape evolving at the rapid rate with many organization continuously face complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and well-funded than before.
Ariffin, Aswami +3 more
core +3 more sources
This work provides an answer to the following key question: Are the Web‐based management interfaces of the contemporary off‐the‐shelf wireless access points (WAP) free of flaws and vulnerabilities? The short answer is not very much. That is, after performing a vulnerability assessment on the Web interfaces of six different WAPs by an equal number of ...
Efstratios Chatzoglou +3 more
wiley +1 more source
Towards Cyber Threat Intelligence for the IoT
With the proliferation of digitization and its usage in critical sectors, it is necessary to include information about the occurrence and assessment of cyber threats in an organization's threat mitigation strategy. This Cyber Threat Intelligence (CTI) is
Butun, Ismail +3 more
core +1 more source
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution
Threat modeling and simulation (TMS) was aimed at dynamically capturing the features of attacks, which is a challenging job in complex Industrial Internet of Things (IIoT) control systems due to the complicated relationships among attacks. Recently, Meta Attack Language (MAL) showed its powerful TMS capabilities for representing complex attacks ...
Shuqin Zhang +8 more
wiley +1 more source
Healthcare Security Incident Response Strategy ‐ A Proactive Incident Response (IR) Procedure
The healthcare information system (HIS) has become a victim of cyberattacks. Traditional ways to handle cyber incidents in healthcare organizations follow a predefined incident response (IR) procedure. However, this procedure is usually reactive, missing the opportunities to foresee danger on the horizon.
Ying He +4 more
wiley +1 more source
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider +3 more
core +2 more sources
A Cyber Deception Defense Method Based on Signal Game to Deal with Network Intrusion
Increasingly, cyber security personnel are using cyber deception defense techniques to deal with network intrusions. However, traditional cyber deception techniques (such as honeypots and honeynets) are easily detected by attackers, thus leading to failure.
Chungang Gao +3 more
wiley +1 more source
Basic concepts, approaches and fundamentals of cyber threat intelligence [PDF]
This article is designed to introduce readers to Cyber Threat Intelligence (CTI). Various Threat Hunting (TH) techniques and sources of information about threats were mentioned.
Kozlenko, Oleh, Makovska, Maryna
core +1 more source
A Theoretical review on the importance of Threat Intelligence Sharing & The challenges intricated [PDF]
Cyber Threat Intelligence (CTI) is the emerging strategy of cyber defense which helps organizations to combat the latest and more sophisticated cyber threats. Gathering this threat information, analyzing and communicating it between the security teams is
et.al, Sandhya Sukhabogi
core +1 more source

