Results 81 to 90 of about 2,089 (203)

Cyber Threat Intelligence Sharing: A Survey [PDF]

open access: yes
The importance of CTI is underscored by its ability to provide structured and actionable insights into threat landscapes, helping organizations anticipate and neutralize cyber-attacks before they manifest.
Katila, Charles   +2 more
core   +1 more source

Quality Dimensions for Automatic Assessment of Structured Cyber Threat Intelligence Data

open access: yesApplied Sciences
Cyber threat intelligence (CTI) has emerged as a promising approach to mitigating the effect of malicious activities. However, the potential usability of CTI data depends largely on their quality.
Algimantas VenĨkauskas   +2 more
doaj   +1 more source

Detect and visualize vulnerable systems using active vulnerability scans [PDF]

open access: yes, 2019
Cyber Threat Intelligence helps organisations to improve their security and protect against threats and attacks. The main basis of CTI is the collection and management of information.
Garralaga Alvarez, Mikel
core  

Recognizing and Extracting Cybersecurtity-relevant Entities from Text

open access: yes, 2022
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attacks and is often used as training data for AI-based cyber defense systems such as Cybersecurity Knowledge Graphs (CKG).
Finin, Tim   +4 more
core  

Evaluating Cyber Threat Intelligence: Accuracy, Completeness, Relevance, and Freshness

open access: yesIEEE Access
In the realm of cybersecurity, the extraction of Cyber Threat Intelligence (CTI) is vital for acquiring accurate Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IoC) from reputable sources.
Asad Ali, Ren-Hung Hwang, Ying-Dar Lin
doaj   +1 more source

Automation and Orchestration in Cyber Threat Intelligence (CTI): A Survey

open access: yesInternational Journal for Research in Applied Science and Engineering Technology
Cyber Threat Intelligence (CTI) has become an essential part of security operations with the sudden rise in cyber threats. To manage the collection, enrichment, correlation, and response workflows for CTI, several automation and orchestration technologies, such as SOAR (Security Orchestration, Automation, and Response) platforms and CTI pipelines are ...
openaire   +1 more source

Artificial Intelligence in Cybersecurity: A New Paradigm Revolutionizing Threat Intelligence and Defense Mechanism [PDF]

open access: yes
The frequency and proficiency of Cyber-attacks have been increasing lately, this transition necessitates a more robust and protected security defense practices such as near-immediate detection, analysis, and defense by cyber security and forensic ...
Muktevi, Laasya Priya, Sinha, Utkarsh
core   +1 more source

A zero-shot self-improving NER method for cyber threat intelligence via knowledge injection

open access: yesCybersecurity
The rapid evolution of cyber threats demands efficient entity extraction from Cyber Threat Intelligence (CTI) reports to support proactive analysis and sharing.
Yingchang Jiang   +6 more
doaj   +1 more source

CyberEntRel: Joint Extraction of Cyber Entities and Relations using Deep Learning [PDF]

open access: yes
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense strategies for security professionals. These are built from cyber threat intelligence data based on relation triples where each relation triple contains two ...
Ahmed, Kashan   +2 more
core   +2 more sources

Development of a Machine Learning-Based Cyber Threat Intelligence Dashboard System for Strategic Operations Centre [PDF]

open access: yes
Cyber Threat Intelligence (CTI) has become an essential element in the toolkit of Cybersecurity experts. In recent years, the significance of CTI has grown exponentially due to the increasing sophistication and frequency of cyber attacks.
Alhassan, J. K.   +3 more
core   +1 more source

Home - About - Disclaimer - Privacy