Results 61 to 70 of about 2,124 (200)

Enhancing resilience of advanced power protection systems in smart grids against cyber–physical threats

open access: yesIET Renewable Power Generation, Volume 18, Issue 5, Page 837-862, 6 April 2024.
Basic adaptive overcurrent relay protection scheme and highlight cyber threats. Abstract Recently, smart grids introduce significant challenges to power system protection due to the high integration with distributed energy resources (DERs) and communication systems.
Feras Alasali   +7 more
wiley   +1 more source

Knowledge graph reasoning for cyber attack detection

open access: yesIET Communications, Volume 18, Issue 4, Page 297-308, March 2024.
In our interconnected world, cyber threats continuously evolve, presenting unprecedented challenges to cybersecurity. Conventional methods such as anomaly‐based and feature‐based approaches are encountering limitations and proving inadequate. The utilization of knowledge graph reasoning, leveraging graph structures, emerges as a promising paradigm ...
Ezekia Gilliard   +2 more
wiley   +1 more source

NLP-Based Techniques for Cyber Threat Intelligence

open access: yes, 2023
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and ...
A., Rafidha Rehiman K.   +6 more
core  

Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection [PDF]

open access: yes, 2020
The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber security professionals in both ...
Nweke, Livinus Obiora   +1 more
core   +1 more source

A New Perspective and Model Proposal for Cyber Threat Intelligence after Pager Attacks

open access: yesGüvenlik Stratejileri Dergisi
This study explores the September 2024 pager attacks on Hezbollah as a case study to propose an expanded model for Cyber Threat Intelligence (CTI) within the framework of hybrid warfare.
Tuncay Doğantuna, Onur Ceran
doaj   +1 more source

A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 1, January/February 2024.
Abstract The challenge of decision‐making under uncertainty in information security has become increasingly important, given the unpredictable probabilities and effects of events in the ever‐changing cyber threat landscape. Cyber threat intelligence provides decision‐makers with the necessary information and context to understand and anticipate ...
Martijn Dekker, Lampis Alevizos
wiley   +1 more source

A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace

open access: yesBlockchain: Research and Applications
The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment.
Yuan Zhou   +5 more
doaj   +1 more source

Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review

open access: yesApplied Sciences
This study provides a systematic overview of Natural Language Processing (NLP)-based frameworks for Cyber Threat Intelligence (CTI) and the early prediction of cyberattacks in Industry 4.0. As digital transformation accelerates through the integration of
Majed Albarrak   +2 more
doaj   +1 more source

Machine Learning Aided Static Malware Analysis: A Survey and Tutorial

open access: yes, 2018
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov   +8 more
core   +1 more source

A survey of cyber threat intelligence in embedded system driven security for mobile health systems

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Healthcare delivery has been transformed speedily due to the development of mobile health (mHealth) applications, which have in turn improved its efficiency and accessibility.
Anayo Chukwu Ikegwu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy