Results 51 to 60 of about 2,089 (203)

Highly Sensitive Adaptive Protection for EV‐Integrated Distribution Networks

open access: yesInternational Transactions on Electrical Energy Systems, Volume 2026, Issue 1, 2026.
Integrating electric vehicle (EV)‐charging infrastructure presents environmental advantages, particularly in curbing carbon emissions within the transport sector and promoting sustainable energy solutions. However, the ascending adoption of EVs transforms the operational dynamics of low‐voltage distribution networks by introducing bidirectional power ...
Feras Alasali   +7 more
wiley   +1 more source

Cyber Threat Intelligence: How to Collect and Analyse Data to Detect, Prevent and Mitigate Cyber Threats [PDF]

open access: yes, 2020
This research examines advanced techniques for cyber threat intelligence (CTI), focusing on methods to collect, analyse and leverage data for detecting, preventing, and mitigating cyber threats.
Aryendra Dalal
core   +1 more source

Cyber Threat Intelligence : Challenges and Opportunities

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro   +2 more
core   +1 more source

Strategies Using Threat Intelligence to Detect Advanced Persistent Threats: A Qualitative Case Study [PDF]

open access: yes, 2022
Advanced persistent threats (APTs) targeting critical infrastructures can adversely impact human lives. Cyber security analysts are concerned with APT attacks because they make it challenging to defend critical infrastructures.
Joyner, Melisa A
core   +1 more source

Revolutionizing Cyber Defense: Leveraging Generative AI for Adaptive Threat Hunting

open access: yesInternet Technology Letters, Volume 8, Issue 4, July/August 2025.
ABSTRACT Adaptive threat hunting, powered by Generative AI (GenAI), is reshaping the cybersecurity landscape, equipping analysts with the tools to predict, detect, and dynamically mitigate cyber threats. Adaptive threat hunting is critical because it enables an organization to detect threats proactively in the infrastructure, thereby reducing the risks
Aditya K. Sood, Sherali Zeadally
wiley   +1 more source

CTI-Thinker: an LLM-driven system for CTI knowledge graph construction and attack reasoning

open access: yesCybersecurity
With the increasing frequency of APT attacks, cyber defense urgently demands high-quality threat intelligence support. Cyber threat intelligence (CTI) knowledge graphs have demonstrated significant potential in aiding threat detection and behavioral ...
Xiuzhang Yang   +9 more
doaj   +1 more source

Systematic literature review: Digital twins' role in enhancing security for Industry 4.0 applications

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 5, September/October 2024.
Abstract Connectivity and data exchange are key features of Industry 4.0. In this paradigm, (Industrial) Internet of Things ((I)IoT) devices are a vital component facilitating the collection and transmission of environmental data from the physical system to the central station for processing and analysis (digital twin [DT]).
Mohammed El‐Hajj   +2 more
wiley   +1 more source

CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis

open access: yes2025 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
Organizations are increasingly targeted by Advanced Persistent Threats (APTs), which involve complex, multi-stage tactics and diverse techniques. Cyber Threat Intelligence (CTI) sources, such as incident reports and security blogs, provide valuable insights, but are often unstructured and in natural language, making it difficult to automatically ...
Della Penna, Sofia   +4 more
openaire   +3 more sources

Enhancing resilience of advanced power protection systems in smart grids against cyber–physical threats

open access: yesIET Renewable Power Generation, Volume 18, Issue 5, Page 837-862, 6 April 2024.
Basic adaptive overcurrent relay protection scheme and highlight cyber threats. Abstract Recently, smart grids introduce significant challenges to power system protection due to the high integration with distributed energy resources (DERs) and communication systems.
Feras Alasali   +7 more
wiley   +1 more source

A New Perspective and Model Proposal for Cyber Threat Intelligence after Pager Attacks

open access: yesGüvenlik Stratejileri Dergisi
This study explores the September 2024 pager attacks on Hezbollah as a case study to propose an expanded model for Cyber Threat Intelligence (CTI) within the framework of hybrid warfare.
Tuncay Doğantuna, Onur Ceran
doaj   +1 more source

Home - About - Disclaimer - Privacy