Results 21 to 30 of about 557,385 (336)
Cyber threat attribution using unstructured reports in cyber threat intelligence
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj +1 more source
Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider +3 more
core +2 more sources
Research and application exploration of threat intelligence system of telecom operators
With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set ...
Haitao ZHANG +3 more
doaj +2 more sources
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj +1 more source
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker.
Yizhe You +7 more
doaj +1 more source
The Challenges of Leveraging Threat Intelligence to Stop Data Breaches
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim +3 more
doaj +1 more source
Aerosolization of Water Ejected from a Full Container Impacted by Bomb Fragments
In assessing the potential collateral effects of bomb attacks on tanks of stored liquids, it is useful to separate the liquid that is aerosolized as an escaping cloud from that which remains inside the tank or rapidly falls to the nearby ground.
Leo W. Stockham +3 more
doaj +1 more source
Application of security threat intelligence based on big data analysis in telecom operators
As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to ...
Mingxia BO +3 more
doaj +2 more sources
Nation-State Threat Actor Attribution Using Fuzzy Hashing
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) have been waging a covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions to be imposed, malware attribution is
Michal Kida, Oluwafemi Olukoya
doaj +1 more source
Asymptotically Unambitious Artificial General Intelligence
General intelligence, the ability to solve arbitrary solvable problems, is supposed by many to be artificially constructible. Narrow intelligence, the ability to solve a given particularly difficult problem, has seen impressive recent development ...
Cohen, Michael K +2 more
core +1 more source

