Results 11 to 20 of about 546,292 (293)

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

Research and application exploration of threat intelligence system of telecom operators

open access: yesDianxin kexue, 2022
With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set ...
Haitao ZHANG   +3 more
doaj   +2 more sources

Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience

open access: yesBig Data and Cognitive Computing, 2022
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj   +1 more source

Cyber Threat Intelligence [PDF]

open access: yes, 2018
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices.
Dehghantanha A., Conti M., Dargahi T.
openaire   +2 more sources

Nation-State Threat Actor Attribution Using Fuzzy Hashing

open access: yesIEEE Access, 2023
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) have been waging a covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions to be imposed, malware attribution is
Michal Kida, Oluwafemi Olukoya
doaj   +1 more source

TIM: threat context-enhanced TTP intelligence mining on unstructured threat data

open access: yesCybersecurity, 2022
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker.
Yizhe You   +7 more
doaj   +1 more source

The Potential Benefits and Challenges of a BRICS+ Agency for Cybersecurity Intelligence Exchange

open access: yesJournal of Information Security and Cybercrimes Research, 2023
The Brazil, Russia, India, China, South Africa (BRICS) nations lack a cohesive cybersecurity framework for intelligence exchange. The proposed expansion of the BRICS bloc calls for a BRICS+ agency dedicated to cybersecurity information sharing and ...
Masike Malatji, Walter Matli
doaj   +1 more source

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

open access: yesFrontiers in Computer Science, 2020
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim   +3 more
doaj   +1 more source

Automotive Vulnerability Disclosure: Stakeholders, Opportunities, Challenges

open access: yesJournal of Cybersecurity and Privacy, 2021
Since several years, the overall awareness for the necessity to consider a vehicle as a potentially vulnerable system is facing accelerated growth. In 2015, the safety relevant exploitability of vulnerabilities through cyber attacks was exposed to a ...
Robin Bolz, Reiner Kriesten
doaj   +1 more source

Aerosolization of Water Ejected from a Full Container Impacted by Bomb Fragments

open access: yesShock and Vibration, 2012
In assessing the potential collateral effects of bomb attacks on tanks of stored liquids, it is useful to separate the liquid that is aerosolized as an escaping cloud from that which remains inside the tank or rapidly falls to the nearby ground.
Leo W. Stockham   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy