Results 61 to 70 of about 2,089 (203)

Legal Issues Related to Cyber Threat Information Sharing Among Private Entities for Critical Infrastructure Protection [PDF]

open access: yes, 2020
The menace of cyber attacks has become a concern for both the public and private sectors. Several approaches have been proposed to tackle the challenge, but an approach that has received widespread acceptance among cyber security professionals in both ...
Nweke, Livinus Obiora   +1 more
core   +1 more source

Knowledge graph reasoning for cyber attack detection

open access: yesIET Communications, Volume 18, Issue 4, Page 297-308, March 2024.
In our interconnected world, cyber threats continuously evolve, presenting unprecedented challenges to cybersecurity. Conventional methods such as anomaly‐based and feature‐based approaches are encountering limitations and proving inadequate. The utilization of knowledge graph reasoning, leveraging graph structures, emerges as a promising paradigm ...
Ezekia Gilliard   +2 more
wiley   +1 more source

A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace

open access: yesBlockchain: Research and Applications
The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment.
Yuan Zhou   +5 more
doaj   +1 more source

NLP-Based Techniques for Cyber Threat Intelligence

open access: yes, 2023
In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and ...
A., Rafidha Rehiman K.   +6 more
core  

A threat‐intelligence driven methodology to incorporate uncertainty in cyber risk analysis and enhance decision‐making

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 1, January/February 2024.
Abstract The challenge of decision‐making under uncertainty in information security has become increasingly important, given the unpredictable probabilities and effects of events in the ever‐changing cyber threat landscape. Cyber threat intelligence provides decision‐makers with the necessary information and context to understand and anticipate ...
Martijn Dekker, Lampis Alevizos
wiley   +1 more source

Natural Language Processing (NLP)-Based Frameworks for Cyber Threat Intelligence and Early Prediction of Cyberattacks in Industry 4.0: A Systematic Literature Review

open access: yesApplied Sciences
This study provides a systematic overview of Natural Language Processing (NLP)-based frameworks for Cyber Threat Intelligence (CTI) and the early prediction of cyberattacks in Industry 4.0. As digital transformation accelerates through the integration of
Majed Albarrak   +2 more
doaj   +1 more source

A survey of cyber threat intelligence in embedded system driven security for mobile health systems

open access: yesJournal of Cloud Computing: Advances, Systems and Applications
Healthcare delivery has been transformed speedily due to the development of mobile health (mHealth) applications, which have in turn improved its efficiency and accessibility.
Anayo Chukwu Ikegwu   +3 more
doaj   +1 more source

Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making.
Charalampos Bratsas   +5 more
doaj   +1 more source

Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents [PDF]

open access: yes
The lack of automation is one of the main issues hindering the broad usage of high-level Cyber Threat Intelligence (CTI). Creating and using such information by capturing Tactics, Techniques and Procedures (TTPs) is currently an arduous manual task for ...
Costante, Elisa   +3 more
core   +1 more source

Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models

open access: yesFuture Internet
The Industrial Internet of Things (IIoT) is transforming industrial operations through connected devices and real-time automation but also introduces significant cybersecurity risks.
Abin Kumbalapalliyil Tom   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy