Combining sociocultural intelligence with Artificial Intelligence to increase organizational cyber security provision through enhanced resilience [PDF]
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Lee, Y.-I., Trim, Peter
core +1 more source
Exploring topic models to discern cyber threats on Twitter: A case study on Log4Shell
Gathering information about cyber threats from various sources can help organisations improve proactive cyber defense and mitigate potential cyber attacks.
Yue Wang +3 more
doaj +1 more source
Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.
Fatimah Aldauiji +2 more
doaj +1 more source
Are crowd-sourced CTI datasets ready for supporting anti-cybercrime intelligence? [PDF]
Cyber crimes rapidly increased over the past years, with attackers performing large-scale activities, using sophisticated and complex tactics and techniques, that have targeted governments, companies, and even strategic infrastructures.
Allegretta, Mauro +3 more
core +1 more source
RedAI: A Machine Learning Approach to Cyber Threat Intelligence [PDF]
The world is continually demanding more effective and intelligent solutions and strategies to combat adversary groups across the cyber defense landscape.
Noel, Luke
core +1 more source
Cyber threats have become a threat to the banking industry, and resulting in the business attempting to implement artificial intelligence strategies while build resilient cyber-defense systems. This is done to ensure that unauthorized access, which leads to cyber-attacks, is severely limited. The credit trade is undergoing significant technical change.
Eke Roberts Ndukwe, Barileé B. Baridam
openaire +1 more source
Snowball-Miner: Integration of Deep Learning for Extraction of Cyber Threat Intelligence from Dark Web [PDF]
In Cyber threat intelligence is a crucial component in defending against cybersecurity threats. Cyber security dark web, security Blogs, Hackers’ community, news forums, Open-Source Intelligence (OSINT) are known as the harbor of illicit activities and ...
Abir Dutta, et al.
core +2 more sources
Applications of Cyber Threat Intelligence (CTI) in Financial Institutions and Challenges in Its Adoption [PDF]
The critical nature of financial infrastructures makes them prime targets for cybercriminal activities, underscoring the need for robust security measures.
Kayode-Ajala, Olaolu
core +1 more source
Cyber threat intelligence sharing: Survey and research directions [PDF]
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process of CTI sharing, and even the basic consumption, has raised new challenges for ...
Abouzahra +102 more
core +1 more source
Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing
We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic.
Hatma Suryotrisongko +3 more
doaj +1 more source

