Results 51 to 60 of about 2,089 (203)
Highly Sensitive Adaptive Protection for EV‐Integrated Distribution Networks
Integrating electric vehicle (EV)‐charging infrastructure presents environmental advantages, particularly in curbing carbon emissions within the transport sector and promoting sustainable energy solutions. However, the ascending adoption of EVs transforms the operational dynamics of low‐voltage distribution networks by introducing bidirectional power ...
Feras Alasali +7 more
wiley +1 more source
Cyber Threat Intelligence: How to Collect and Analyse Data to Detect, Prevent and Mitigate Cyber Threats [PDF]
This research examines advanced techniques for cyber threat intelligence (CTI), focusing on methods to collect, analyse and leverage data for detecting, preventing, and mitigating cyber threats.
Aryendra Dalal
core +1 more source
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime.
Conti, Mauro +2 more
core +1 more source
Strategies Using Threat Intelligence to Detect Advanced Persistent Threats: A Qualitative Case Study [PDF]
Advanced persistent threats (APTs) targeting critical infrastructures can adversely impact human lives. Cyber security analysts are concerned with APT attacks because they make it challenging to defend critical infrastructures.
Joyner, Melisa A
core +1 more source
Revolutionizing Cyber Defense: Leveraging Generative AI for Adaptive Threat Hunting
ABSTRACT Adaptive threat hunting, powered by Generative AI (GenAI), is reshaping the cybersecurity landscape, equipping analysts with the tools to predict, detect, and dynamically mitigate cyber threats. Adaptive threat hunting is critical because it enables an organization to detect threats proactively in the infrastructure, thereby reducing the risks
Aditya K. Sood, Sherali Zeadally
wiley +1 more source
CTI-Thinker: an LLM-driven system for CTI knowledge graph construction and attack reasoning
With the increasing frequency of APT attacks, cyber defense urgently demands high-quality threat intelligence support. Cyber threat intelligence (CTI) knowledge graphs have demonstrated significant potential in aiding threat detection and behavioral ...
Xiuzhang Yang +9 more
doaj +1 more source
Abstract Connectivity and data exchange are key features of Industry 4.0. In this paradigm, (Industrial) Internet of Things ((I)IoT) devices are a vital component facilitating the collection and transmission of environmental data from the physical system to the central station for processing and analysis (digital twin [DT]).
Mohammed El‐Hajj +2 more
wiley +1 more source
CTI-HAL: A Human-Annotated Dataset for Cyber Threat Intelligence Analysis
Organizations are increasingly targeted by Advanced Persistent Threats (APTs), which involve complex, multi-stage tactics and diverse techniques. Cyber Threat Intelligence (CTI) sources, such as incident reports and security blogs, provide valuable insights, but are often unstructured and in natural language, making it difficult to automatically ...
Della Penna, Sofia +4 more
openaire +3 more sources
Basic adaptive overcurrent relay protection scheme and highlight cyber threats. Abstract Recently, smart grids introduce significant challenges to power system protection due to the high integration with distributed energy resources (DERs) and communication systems.
Feras Alasali +7 more
wiley +1 more source
A New Perspective and Model Proposal for Cyber Threat Intelligence after Pager Attacks
This study explores the September 2024 pager attacks on Hezbollah as a case study to propose an expanded model for Cyber Threat Intelligence (CTI) within the framework of hybrid warfare.
Tuncay Doğantuna, Onur Ceran
doaj +1 more source

