Results 61 to 70 of about 2,089 (203)
Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection [PDF]
The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber security professionals in both ...
Nweke, Livinus Obiora +1 more
core +1 more source
Knowledge graph reasoning for cyber attack detection
In our interconnected world, cyber threats continuously evolve, presenting unprecedented challenges to cybersecurity. Conventional methods such as anomaly‐based and feature‐based approaches are encountering limitations and proving inadequate. The utilization of knowledge graph reasoning, leveraging graph structures, emerges as a promising paradigm ...
Ezekia Gilliard +2 more
wiley +1 more source
The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment.
Yuan Zhou +5 more
doaj +1 more source
NLP-Based Techniques for Cyber Threat Intelligence
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and ...
A., Rafidha Rehiman K. +6 more
core
Abstract The challenge of decision‐making under uncertainty in information security has become increasingly important, given the unpredictable probabilities and effects of events in the ever‐changing cyber threat landscape. Cyber threat intelligence provides decision‐makers with the necessary information and context to understand and anticipate ...
Martijn Dekker, Lampis Alevizos
wiley +1 more source
This study provides a systematic overview of Natural Language Processing (NLP)-based frameworks for Cyber Threat Intelligence (CTI) and the early prediction of cyberattacks in Industry 4.0. As digital transformation accelerates through the integration of
Majed Albarrak +2 more
doaj +1 more source
A survey of cyber threat intelligence in embedded system driven security for mobile health systems
Healthcare delivery has been transformed speedily due to the development of mobile health (mHealth) applications, which have in turn improved its efficiency and accessibility.
Anayo Chukwu Ikegwu +3 more
doaj +1 more source
Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making.
Charalampos Bratsas +5 more
doaj +1 more source
Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents [PDF]
The lack of automation is one of the main issues hindering the broad usage of high-level Cyber Threat Intelligence (CTI). Creating and using such information by capturing Tactics, Techniques and Procedures (TTPs) is currently an arduous manual task for ...
Costante, Elisa +3 more
core +1 more source
The Industrial Internet of Things (IIoT) is transforming industrial operations through connected devices and real-time automation but also introduces significant cybersecurity risks.
Abin Kumbalapalliyil Tom +5 more
doaj +1 more source

