Results 71 to 80 of about 2,124 (200)
Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents [PDF]
The lack of automation is one of the main issues hindering the broad usage of high-level Cyber Threat Intelligence (CTI). Creating and using such information by capturing Tactics, Techniques and Procedures (TTPs) is currently an arduous manual task for ...
Costante, Elisa +3 more
core +1 more source
Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making.
Charalampos Bratsas +5 more
doaj +1 more source
The Industrial Internet of Things (IIoT) is transforming industrial operations through connected devices and real-time automation but also introduces significant cybersecurity risks.
Abin Kumbalapalliyil Tom +5 more
doaj +1 more source
Governance for Cyber Threat Intelligence (CTI) Exchange Across the DYNAMO Resilience Cycle
Cyber threats continue to escalate in complexity and frequency, underlining the need for effective Cyber Threat Intelligence (CTI) exchange to secure critical infrastructures across various sectors. However, the sharing of CTI is often impeded by concerns relating to security, trust, compliance, and coordination among stakeholders.
Jyri Rajamäki, Anup Nepal
openaire +1 more source
Addressing the expanding Advanced Persistent Threat (APT) landscape is crucial for governments, enterprises and threat intelligence research groups. While defenders often rely on tabular formats for assets like logs, alerts, firewall rules; attackers ...
Burak Gulbay, Mehmet Demirci
doaj +1 more source
LLM-powered threat intelligence: a retrieval-augmented generation approach for cyber attack investigation [PDF]
Threat intelligence involves collecting, analyzing, and disseminating information about cyber threats to help organizations proactively defend against attacks.
Abeer Alhuzali
doaj +2 more sources
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models
Cyber threat intelligence (CTI) is practical real-world information that is collected with the purpose of assessing threats in cyber-physical systems (CPS). A practical notation for sharing CTI is STIX.
Czekster, Ricardo M. +2 more
core
In today’s world, cyber-attacks are becoming more frequent and thus proactive protection against them is becoming more important. Cyber Threat Intelligence (CTI) is a possible solution, as it collects threat information in various information ...
Philipp Kuhn +2 more
doaj +1 more source
Enhancing Cyber Threat Intelligence (CTI) Exchange: A Governance Model for the DYNAMO Platform
The growing complexity of cyber threats, especially within critical infrastructure sectors like healthcare, energy, and maritime, highlights the need for comprehensive frameworks to facilitate the exchange of Cyber Threat Intelligence (CTI). This paper presents a CTI Exchange Governance Model aimed at enhancing the CTI sharing process within the DYNAMO
Jyri Rajamäki +2 more
openaire +1 more source
AI-Based Holistic Framework for Cyber Threat Intelligence Management
Cyber Threat Intelligence (CTI) is an important asset for organisations to facilitate the safeguarding of their systems against new and emerging cyber threats.
Arnolnt Spyros +8 more
doaj +1 more source

