Results 91 to 100 of about 552,762 (243)
A threat intelligence framework for protecting smart satellite-based healthcare networks. [PDF]
Al-Hawawreh M, Moustafa N, Slay J.
europepmc +1 more source
Big data security analysis method based on self-update threat intelligence database
Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.
Yanfang HOU, Jinhua WANG
doaj +2 more sources
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan +2 more
doaj
Trust Inference Mechanism Based on Threat Intelligence and Device Health Features
In today’s increasingly severe cybersecurity threat landscape, threat intelligence from a single source can no longer fully reflect the actual risks faced by a device.
Chun-Li Lin, Guan-Hao Cheng
doaj +1 more source
Cyber-Risk Prioritisation Under Partial Information to Support Threat Intelligence
Mario Angelelli +3 more
openalex +1 more source
Federated Learning offers a promising approach for building Cyber Threat Intelligence (CTI) by utilizing cross-domain data in Software Defined Networking (SDN) while addressing privacy concerns.
Syed Hussain Ali Kazmi +3 more
doaj +1 more source
Cyber Threat vulnerability for Business Intelligence in Big Data
Aditya Kapoor
openalex +1 more source

