Results 11 to 20 of about 546,292 (293)
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider +3 more
core +2 more sources
Research and application exploration of threat intelligence system of telecom operators
With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set ...
Haitao ZHANG +3 more
doaj +2 more sources
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj +1 more source
Cyber Threat Intelligence [PDF]
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire +2 more sources
Nation-State Threat Actor Attribution Using Fuzzy Hashing
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) have been waging a covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions to be imposed, malware attribution is
Michal Kida, Oluwafemi Olukoya
doaj +1 more source
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker.
Yizhe You +7 more
doaj +1 more source
The Potential Benefits and Challenges of a BRICS+ Agency for Cybersecurity Intelligence Exchange
The Brazil, Russia, India, China, South Africa (BRICS) nations lack a cohesive cybersecurity framework for intelligence exchange. The proposed expansion of the BRICS bloc calls for a BRICS+ agency dedicated to cybersecurity information sharing and ...
Masike Malatji, Walter Matli
doaj +1 more source
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim +3 more
doaj +1 more source
Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges
Since several years, the overall awareness for the necessity to consider a vehicle as a potentially vulnerable system is facing accelerated growth. In 2015, the safety relevant exploitability of vulnerabilities through cyber attacks was exposed to a ...
Robin Bolz, Reiner Kriesten
doaj +1 more source
Aerosolization of Water Ejected from a Full Container Impacted by Bomb Fragments
In assessing the potential collateral effects of bomb attacks on tanks of stored liquids, it is useful to separate the liquid that is aerosolized as an escaping cloud from that which remains inside the tank or rapidly falls to the nearby ground.
Leo W. Stockham +3 more
doaj +1 more source

