Results 1 to 10 of about 546,292 (293)

On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities [PDF]

open access: yesSensors, 2023
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP).
Ricardo Fernandes   +3 more
doaj   +2 more sources

Cybersecurity Threat Intelligence Mining Algorithm for Open Source Heterogeneous Data [PDF]

open access: yesJisuanji kexue, 2023
To address the problem of how to efficiently mine threat intelligence from open source network security reports,a TI-NER-based intelligence mining(TI-NER-IM) method is proposed.Firstly,the IoT cybersecurity reports of nearly 10 years are collected and ...
WEI Tao, LI Zhihua, WANG Changjie, CHENG Shunhang
doaj   +1 more source

An explainable deepfake detection framework on a novel unconstrained dataset

open access: yesComplex & Intelligent Systems, 2023
In this work, we created a new large-scale unconstrained high-quality Deepfake Image (DFIM-HQ) dataset containing 140K images. Compared to existing datasets, this dataset includes a variety of diverse scenarios, pose variations, high-quality degradations,
Sherin Mathews   +4 more
doaj   +1 more source

A Shared Cybersecurity Awareness Platform

open access: yesJournal of Telecommunications and Information Technology, 2021
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities.
Marek Amanowicz
doaj   +1 more source

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

open access: yesFuture Internet, 2020
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva   +3 more
doaj   +1 more source

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

open access: yesIEEE Access, 2020
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi   +2 more
doaj   +1 more source

Investigating Proactive Digital Forensics Leveraging Adversary Emulation

open access: yesApplied Sciences, 2022
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud computing forensics such as evidence identification, collection, preservation,
Valentine Machaka, Titus Balan
doaj   +1 more source

Cyber threat attribution using unstructured reports in cyber threat intelligence

open access: yesEgyptian Informatics Journal, 2023
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj   +1 more source

Threat Intelligence Computing [PDF]

open access: yesProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Cyber threat hunting is the process of proactively and iteratively formulating and validating threat hypotheses based on security-relevant observations and domain knowledge. To facilitate threat hunting tasks, this paper introduces threat intelligence computing as a new methodology that models threat discovery as a graph computation problem. It enables
Xiaokui Shu   +6 more
openaire   +1 more source

CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]

open access: yesJournal of International Legal Communication, 2022
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj   +1 more source

Home - About - Disclaimer - Privacy