Results 11 to 20 of about 557,385 (336)
On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities [PDF]
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP).
Ricardo Fernandes +3 more
doaj +2 more sources
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva +3 more
doaj +3 more sources
Cyber Threat Intelligence: Challenges and Opportunities [PDF]
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime. In practice, timely dealing with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ...
Mauro Conti +2 more
openaire +3 more sources
Cybersecurity Threat Intelligence Mining Algorithm for Open Source Heterogeneous Data [PDF]
To address the problem of how to efficiently mine threat intelligence from open source network security reports,a TI-NER-based intelligence mining(TI-NER-IM) method is proposed.Firstly,the IoT cybersecurity reports of nearly 10 years are collected and ...
WEI Tao, LI Zhihua, WANG Changjie, CHENG Shunhang
doaj +1 more source
An explainable deepfake detection framework on a novel unconstrained dataset
In this work, we created a new large-scale unconstrained high-quality Deepfake Image (DFIM-HQ) dataset containing 140K images. Compared to existing datasets, this dataset includes a variety of diverse scenarios, pose variations, high-quality degradations,
Sherin Mathews +4 more
doaj +1 more source
Threat Intelligence Computing [PDF]
Cyber threat hunting is the process of proactively and iteratively formulating and validating threat hypotheses based on security-relevant observations and domain knowledge. To facilitate threat hunting tasks, this paper introduces threat intelligence computing as a new methodology that models threat discovery as a graph computation problem. It enables
Xiaokui Shu +6 more
openaire +1 more source
A Shared Cybersecurity Awareness Platform
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities.
Marek Amanowicz
doaj +1 more source
IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi +2 more
doaj +1 more source
Investigating Proactive Digital Forensics Leveraging Adversary Emulation
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud computing forensics such as evidence identification, collection, preservation,
Valentine Machaka, Titus Balan
doaj +1 more source
CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj +1 more source

