Results 61 to 70 of about 2,124 (200)
Basic adaptive overcurrent relay protection scheme and highlight cyber threats. Abstract Recently, smart grids introduce significant challenges to power system protection due to the high integration with distributed energy resources (DERs) and communication systems.
Feras Alasali +7 more
wiley +1 more source
Knowledge graph reasoning for cyber attack detection
In our interconnected world, cyber threats continuously evolve, presenting unprecedented challenges to cybersecurity. Conventional methods such as anomaly‐based and feature‐based approaches are encountering limitations and proving inadequate. The utilization of knowledge graph reasoning, leveraging graph structures, emerges as a promising paradigm ...
Ezekia Gilliard +2 more
wiley +1 more source
NLP-Based Techniques for Cyber Threat Intelligence
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and ...
A., Rafidha Rehiman K. +6 more
core
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection [PDF]
The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber security professionals in both ...
Nweke, Livinus Obiora +1 more
core +1 more source
A New Perspective and Model Proposal for Cyber Threat Intelligence after Pager Attacks
This study explores the September 2024 pager attacks on Hezbollah as a case study to propose an expanded model for Cyber Threat Intelligence (CTI) within the framework of hybrid warfare.
Tuncay Doğantuna, Onur Ceran
doaj +1 more source
Abstract The challenge of decision‐making under uncertainty in information security has become increasingly important, given the unpredictable probabilities and effects of events in the ever‐changing cyber threat landscape. Cyber threat intelligence provides decision‐makers with the necessary information and context to understand and anticipate ...
Martijn Dekker, Lampis Alevizos
wiley +1 more source
The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment.
Yuan Zhou +5 more
doaj +1 more source
This study provides a systematic overview of Natural Language Processing (NLP)-based frameworks for Cyber Threat Intelligence (CTI) and the early prediction of cyberattacks in Industry 4.0. As digital transformation accelerates through the integration of
Majed Albarrak +2 more
doaj +1 more source
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov +8 more
core +1 more source
A survey of cyber threat intelligence in embedded system driven security for mobile health systems
Healthcare delivery has been transformed speedily due to the development of mobile health (mHealth) applications, which have in turn improved its efficiency and accessibility.
Anayo Chukwu Ikegwu +3 more
doaj +1 more source

