Results 281 to 290 of about 557,385 (336)

The threat of intelligent collisions

IT Professional, 2004
With the advent of intelligent transportation systems (ITS), safer and more efficient roadways are on the horizon. Future generations of in-vehicle ITS will network with nearby vehicles for greater safety and efficiency. Through wireless communication and advanced sensor technologies, intelligent vehicles will learn of nearby vehicles' intentions and ...
Jeremy J. Blum, Azim Eskandarian
openaire   +1 more source

Re-thinking threat intelligence

2016 International Conference on Cyber Conflict (CyCon U.S.), 2016
Attribution relies largely on technology; however, experts who rely on technology may inadvertently inject their own biases when evaluating findings. Attackers are now deceiving the analysts, by misleading them through the use of deceptive data and exploiting defender and analyst biases.
Char Sample   +3 more
openaire   +1 more source

Taxonomy of Threat Categorization and Threat Intelligence Platform

2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3), 2019
This research is focused on analyzing existing threat taxonomies to identify which is suitable for bridging the gap between the non-technical and technical professionals following the four high-level objectives of the NIS.
Ahuokpeme Chibueze Brendan   +1 more
openaire   +1 more source

Intelligence Analyses and the Insider Threat

IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, 2012
In the intelligence community, the existence of a malicious insider poses a severe threat to information, to the actual analytic process, and, ultimately, to any decision-making process relying on such information and analyses. An analyst with malicious intent can create irreversible short-term, as well as long-term, damage that is hard to detect.
Eugene Santos   +8 more
openaire   +1 more source

Automating Threat Intelligence for SDL

2018 IEEE Cybersecurity Development (SecDev), 2018
Threat intelligence is very important in order to execute a well-informed Security Development Lifecycle (SDL). Although there are many readily available solutions supporting tactical threat intelligence focusing on enterprise Information Technology (IT) infrastructure, the lack of threat intelligence solutions focusing on SDL is a known gap which is ...
Raghudeep Kannavara   +4 more
openaire   +1 more source

Artificial Intelligence in Cyber Threats Intelligence

2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018
In the field of Cyber Security there has been a transition from the stage of Cyber Criminality to the stage of Cyber War over the last few years. According to the new challenges, the expert community has two main approaches: to adopt the philosophy and methods of Military Intelligence, and to use Artificial Intelligence methods for counteraction of ...
Roumen Trifonov   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy