Results 51 to 60 of about 2,124 (200)

Applications of Cyber Threat Intelligence (CTI) in Financial Institutions and Challenges in Its Adoption [PDF]

open access: yes, 2023
The critical nature of financial infrastructures makes them prime targets for cybercriminal activities, underscoring the need for robust security measures.
Kayode-Ajala, Olaolu
core   +1 more source

Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing

open access: yesIEEE Access, 2022
We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic.
Hatma Suryotrisongko   +3 more
doaj   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Highly Sensitive Adaptive Protection for EV‐Integrated Distribution Networks

open access: yesInternational Transactions on Electrical Energy Systems, Volume 2026, Issue 1, 2026.
Integrating electric vehicle (EV)‐charging infrastructure presents environmental advantages, particularly in curbing carbon emissions within the transport sector and promoting sustainable energy solutions. However, the ascending adoption of EVs transforms the operational dynamics of low‐voltage distribution networks by introducing bidirectional power ...
Feras Alasali   +7 more
wiley   +1 more source

Cyber Threat Intelligence: How to Collect and Analyse Data to Detect, Prevent and Mitigate Cyber Threats [PDF]

open access: yes, 2020
This research examines advanced techniques for cyber threat intelligence (CTI), focusing on methods to collect, analyse and leverage data for detecting, preventing, and mitigating cyber threats.
Aryendra Dalal
core   +1 more source

Strategies Using Threat Intelligence to Detect Advanced Persistent Threats: A Qualitative Case Study [PDF]

open access: yes, 2022
Advanced persistent threats (APTs) targeting critical infrastructures can adversely impact human lives. Cyber security analysts are concerned with APT attacks because they make it challenging to defend critical infrastructures.
Joyner, Melisa A
core   +1 more source

Revolutionizing Cyber Defense: Leveraging Generative AI for Adaptive Threat Hunting

open access: yesInternet Technology Letters, Volume 8, Issue 4, July/August 2025.
ABSTRACT Adaptive threat hunting, powered by Generative AI (GenAI), is reshaping the cybersecurity landscape, equipping analysts with the tools to predict, detect, and dynamically mitigate cyber threats. Adaptive threat hunting is critical because it enables an organization to detect threats proactively in the infrastructure, thereby reducing the risks
Aditya K. Sood, Sherali Zeadally
wiley   +1 more source

CTI-Thinker: an LLM-driven system for CTI knowledge graph construction and attack reasoning

open access: yesCybersecurity
With the increasing frequency of APT attacks, cyber defense urgently demands high-quality threat intelligence support. Cyber threat intelligence (CTI) knowledge graphs have demonstrated significant potential in aiding threat detection and behavioral ...
Xiuzhang Yang   +9 more
doaj   +1 more source

Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract Connectivity and data exchange are key features of Industry 4.0. In this paradigm, (Industrial) Internet of Things ((I)IoT) devices are a vital component facilitating the collection and transmission of environmental data from the physical system to the central station for processing and analysis (digital twin [DT]).
Mohammed El‐Hajj   +2 more
wiley   +1 more source

CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis

open access: yes2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
Organizations are increasingly targeted by Advanced Persistent Threats (APTs), which involve complex, multi-stage tactics and diverse techniques. Cyber Threat Intelligence (CTI) sources, such as incident reports and security blogs, provide valuable insights, but are often unstructured and in natural language, making it difficult to automatically ...
Della Penna, Sofia   +4 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy