Results 11 to 20 of about 557,385 (336)

On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities [PDF]

open access: yesSensors, 2023
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP).
Ricardo Fernandes   +3 more
doaj   +2 more sources

A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence

open access: yesFuture Internet, 2020
The cyber security landscape is fundamentally changing over the past years. While technology is evolving and new sophisticated applications are being developed, a new threat scenario is emerging in alarming proportions.
Alessandra de Melo e Silva   +3 more
doaj   +3 more sources

Cyber Threat Intelligence: Challenges and Opportunities [PDF]

open access: yes, 2018
The ever increasing number of cyber attacks requires the cyber security and forensic specialists to detect, analyze and defend against the cyber threats in almost realtime. In practice, timely dealing with such a large number of attacks is not possible without deeply perusing the attack features and taking corresponding intelligent defensive actions ...
Mauro Conti   +2 more
openaire   +3 more sources

Cybersecurity Threat Intelligence Mining Algorithm for Open Source Heterogeneous Data [PDF]

open access: yesJisuanji kexue, 2023
To address the problem of how to efficiently mine threat intelligence from open source network security reports,a TI-NER-based intelligence mining(TI-NER-IM) method is proposed.Firstly,the IoT cybersecurity reports of nearly 10 years are collected and ...
WEI Tao, LI Zhihua, WANG Changjie, CHENG Shunhang
doaj   +1 more source

An explainable deepfake detection framework on a novel unconstrained dataset

open access: yesComplex & Intelligent Systems, 2023
In this work, we created a new large-scale unconstrained high-quality Deepfake Image (DFIM-HQ) dataset containing 140K images. Compared to existing datasets, this dataset includes a variety of diverse scenarios, pose variations, high-quality degradations,
Sherin Mathews   +4 more
doaj   +1 more source

Threat Intelligence Computing [PDF]

open access: yesProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Cyber threat hunting is the process of proactively and iteratively formulating and validating threat hypotheses based on security-relevant observations and domain knowledge. To facilitate threat hunting tasks, this paper introduces threat intelligence computing as a new methodology that models threat discovery as a graph computation problem. It enables
Xiaokui Shu   +6 more
openaire   +1 more source

A Shared Cybersecurity Awareness Platform

open access: yesJournal of Telecommunications and Information Technology, 2021
Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities.
Marek Amanowicz
doaj   +1 more source

IMDfence: Architecting a Secure Protocol for Implantable Medical Devices

open access: yesIEEE Access, 2020
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi   +2 more
doaj   +1 more source

Investigating Proactive Digital Forensics Leveraging Adversary Emulation

open access: yesApplied Sciences, 2022
Traditional digital forensics techniques are becoming obsolete due to rapid technological change. Proactive digital forensic investigations (PDFI) solve the challenges of cloud computing forensics such as evidence identification, collection, preservation,
Valentine Machaka, Titus Balan
doaj   +1 more source

CYBER THREAT INTELLIGENCE AS A NEW PHENOMENON: LEGAL ASPECT [PDF]

open access: yesJournal of International Legal Communication, 2022
The study gives definitions of cyber threat intelligence and related terms, such as cyber threat, information security, cybersecurity, and others, indicating the purposes, objects, and subjects of the concepts mentioned.
Iryna Sopilko
doaj   +1 more source

Home - About - Disclaimer - Privacy