Results 71 to 80 of about 2,124 (200)

Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents [PDF]

open access: yes
The lack of automation is one of the main issues hindering the broad usage of high-level Cyber Threat Intelligence (CTI). Creating and using such information by capturing Tactics, Techniques and Procedures (TTPs) is currently an arduous manual task for ...
Costante, Elisa   +3 more
core   +1 more source

Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review

open access: yesJournal of Cybersecurity and Privacy
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making.
Charalampos Bratsas   +5 more
doaj   +1 more source

Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models

open access: yesFuture Internet
The Industrial Internet of Things (IIoT) is transforming industrial operations through connected devices and real-time automation but also introduces significant cybersecurity risks.
Abin Kumbalapalliyil Tom   +5 more
doaj   +1 more source

Governance for Cyber Threat Intelligence (CTI) Exchange Across the DYNAMO Resilience Cycle

open access: yesInternational Conference on Cyber Warfare and Security
Cyber threats continue to escalate in complexity and frequency, underlining the need for effective Cyber Threat Intelligence (CTI) exchange to secure critical infrastructures across various sectors. However, the sharing of CTI is often impeded by concerns relating to security, trust, compliance, and coordination among stakeholders.
Jyri Rajamäki, Anup Nepal
openaire   +1 more source

APT-scope: A novel framework to predict advanced persistent threat groups from enriched heterogeneous information network of cyber threat intelligence

open access: yesEngineering Science and Technology, an International Journal
Addressing the expanding Advanced Persistent Threat (APT) landscape is crucial for governments, enterprises and threat intelligence research groups. While defenders often rely on tabular formats for assets like logs, alerts, firewall rules; attackers ...
Burak Gulbay, Mehmet Demirci
doaj   +1 more source

LLM-powered threat intelligence: a retrieval-augmented generation approach for cyber attack investigation [PDF]

open access: yesPeerJ Computer Science
Threat intelligence involves collecting, analyzing, and disseminating information about cyber threats to help organizations proactively defend against attacks.
Abeer Alhuzali
doaj   +2 more sources

cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models

open access: yes, 2022
Cyber threat intelligence (CTI) is practical real-world information that is collected with the purpose of assessing threats in cyber-physical systems (CPS). A practical notation for sharing CTI is STIX.
Czekster, Ricardo M.   +2 more
core  

Navigating the Shadows: Manual and Semi-Automated Evaluation of the Dark Web for Cyber Threat Intelligence

open access: yesIEEE Access
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information ...
Philipp Kuhn   +2 more
doaj   +1 more source

Enhancing Cyber Threat Intelligence (CTI) Exchange: A Governance Model for the DYNAMO Platform

open access: yesEuropean Conference on Cyber Warfare and Security
The growing complexity of cyber threats, especially within critical infrastructure sectors like healthcare, energy, and maritime, highlights the need for comprehensive frameworks to facilitate the exchange of Cyber Threat Intelligence (CTI). This paper presents a CTI Exchange Governance Model aimed at enhancing the CTI sharing process within the DYNAMO
Jyri Rajamäki   +2 more
openaire   +1 more source

AI-Based Holistic Framework for Cyber Threat Intelligence Management

open access: yesIEEE Access
Cyber Threat Intelligence (CTI) is an important asset for organisations to facilitate the safeguarding of their systems against new and emerging cyber threats.
Arnolnt Spyros   +8 more
doaj   +1 more source

Home - About - Disclaimer - Privacy