Results 1 to 10 of about 546,292 (293)
On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities [PDF]
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP).
Ricardo Fernandes +3 more
doaj +2 more sources
Cybersecurity Threat Intelligence Mining Algorithm for Open Source Heterogeneous Data [PDF]
To address the problem of how to efficiently mine threat intelligence from open source network security reports,a TI-NER-based intelligence mining(TI-NER-IM) method is proposed.Firstly,the IoT cybersecurity reports of nearly 10 years are collected and ...
WEI Tao, LI Zhihua, WANG Changjie, CHENG Shunhang
doaj +1 more source
An explainable deepfake detection framework on a novel unconstrained dataset
In this work, we created a new large-scale unconstrained high-quality Deepfake Image (DFIM-HQ) dataset containing 140K images. Compared to existing datasets, this dataset includes a variety of diverse scenarios, pose variations, high-quality degradations,
Sherin Mathews +4 more
doaj +1 more source
A Shared Cybersecurity Awareness Platform
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities.
Marek Amanowicz
doaj +1 more source
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva +3 more
doaj +1 more source
IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi +2 more
doaj +1 more source
Investigating Proactive Digital Forensics Leveraging Adversary Emulation
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud computing forensics such as evidence identification, collection, preservation,
Valentine Machaka, Titus Balan
doaj +1 more source
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj +1 more source
Threat Intelligence Computing [PDF]
Cyber threat hunting is the process of proactively and iteratively formulating and validating threat hypotheses based on security-relevant observations and domain knowledge. To facilitate threat hunting tasks, this paper introduces threat intelligence computing as a new methodology that models threat discovery as a graph computation problem. It enables
Xiaokui Shu +6 more
openaire +1 more source
CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj +1 more source

