Results 71 to 80 of about 2,089 (203)
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Malware analysis and detection techniques have been evolving during the last decade as a reflection to development of different malware techniques to evade network-based and host-based security protections.
Andrii Shalaginov +8 more
core +1 more source
Addressing the expanding Advanced Persistent Threat (APT) landscape is crucial for governments, enterprises and threat intelligence research groups. While defenders often rely on tabular formats for assets like logs, alerts, firewall rules; attackers ...
Burak Gulbay, Mehmet Demirci
doaj +1 more source
LLM-powered threat intelligence: a retrieval-augmented generation approach for cyber attack investigation [PDF]
Threat intelligence involves collecting, analyzing, and disseminating information about cyber threats to help organizations proactively defend against attacks.
Abeer Alhuzali
doaj +2 more sources
Governance for Cyber Threat Intelligence (CTI) Exchange Across the DYNAMO Resilience Cycle
Cyber threats continue to escalate in complexity and frequency, underlining the need for effective Cyber Threat Intelligence (CTI) exchange to secure critical infrastructures across various sectors. However, the sharing of CTI is often impeded by concerns relating to security, trust, compliance, and coordination among stakeholders.
Jyri Rajamäki, Anup Nepal
openaire +1 more source
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information ...
Philipp Kuhn +2 more
doaj +1 more source
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models
Cyber threat intelligence (CTI) is practical real-world information that is collected with the purpose of assessing threats in cyber-physical systems (CPS). A practical notation for sharing CTI is STIX.
Czekster, Ricardo M. +2 more
core
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Cyber Threat Intelligence (CTI) is an important asset for organisations to facilitate the safeguarding of their systems against new and emerging cyber threats.
Arnolnt Spyros +8 more
doaj +1 more source
Enhancing Cyber Threat Intelligence (CTI) Exchange: A Governance Model for the DYNAMO Platform
The growing complexity of cyber threats, especially within critical infrastructure sectors like healthcare, energy, and maritime, highlights the need for comprehensive frameworks to facilitate the exchange of Cyber Threat Intelligence (CTI). This paper presents a CTI Exchange Governance Model aimed at enhancing the CTI sharing process within the DYNAMO
Jyri Rajamäki +2 more
openaire +1 more source
Cyber Threat Intelligence for Hybrid Attacks: Leveraging LLMs and Data Spaces
Cyberattacks have emerged as a critical component of modern hybrid warfare. To effectively counter these hybrid threats, societies require rapid detection and response capabilities.
Jani Suomalainen +3 more
doaj +1 more source
Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework
Automating cyber threat intelligence (CTI) collection and analysis in real time is critical for the timely detection and mitigation of cyber threats. Cybersecurity researchers have recently recommended CTI as a proactive and robust method for automated ...
Alemayehu Tilahun Haile +2 more
doaj +1 more source

