Results 91 to 100 of about 552,762 (243)

Big data security analysis method based on self-update threat intelligence database

open access: yesDianxin kexue, 2018
Big data security analysis method is generally based on the existing signature database to detect and match malicious behaviors.This method can only detect known attacks and can't analyze and judge new types of unknown attacks and complex variant attacks.
Yanfang HOU, Jinhua WANG
doaj   +2 more sources

Research on knowledge graph construction technology for cyber threat intelligence based on large language models

open access: yesTongxin xuebao
As the complexity and sophistication of cyber threats continue to increase, integrating cyber threat intelligence into cybersecurity measures has become crucial.
LAI Qingnan   +2 more
doaj  

Trust Inference Mechanism Based on Threat Intelligence and Device Health Features

open access: yesIEEE Access
In today’s increasingly severe cybersecurity threat landscape, threat intelligence from a single source can no longer fully reflect the actual risks faced by a device.
Chun-Li Lin, Guan-Hao Cheng
doaj   +1 more source

Cyber-Risk Prioritisation Under Partial Information to Support Threat Intelligence

open access: green, 2023
Mario Angelelli   +3 more
openalex   +1 more source

FOCC: A Synthetically Balanced Federated One-Class-Classification for Cyber Threat Intelligence in Software Defined Networking

open access: yesIEEE Open Journal of the Computer Society
Federated Learning offers a promising approach for building Cyber Threat Intelligence (CTI) by utilizing cross-domain data in Software Defined Networking (SDN) while addressing privacy concerns.
Syed Hussain Ali Kazmi   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy