Results 21 to 30 of about 557,385 (336)

Cyber threat attribution using unstructured reports in cyber threat intelligence

open access: yesEgyptian Informatics Journal, 2023
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its identity.
Ehtsham Irshad, Abdul Basit Siddiqui
doaj   +1 more source

Adaptive Traffic Fingerprinting for Darknet Threat Intelligence [PDF]

open access: yes, 2018
Darknet technology such as Tor has been used by various threat actors for organising illegal activities and data exfiltration. As such, there is a case for organisations to block such traffic, or to try and identify when it is used and for what purposes.
Al-Khateeb, Haider   +3 more
core   +2 more sources

Research and application exploration of threat intelligence system of telecom operators

open access: yesDianxin kexue, 2022
With the increasing inequality of network attack and defense in the Internet era, threat intelligence has become one of the important tools to narrow this gap.Based on the analysis of the research status of threat intelligence at home and abroad, a set ...
Haitao ZHANG   +3 more
doaj   +2 more sources

Combining Sociocultural Intelligence with Artificial Intelligence to Increase Organizational Cyber Security Provision through Enhanced Resilience

open access: yesBig Data and Cognitive Computing, 2022
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve cyber security management, not all managers understand the different types of AI/ML and how they are to be deployed alongside the benefits associated with ...
Peter R. J. Trim, Yang-Im Lee
doaj   +1 more source

TIM: threat context-enhanced TTP intelligence mining on unstructured threat data

open access: yesCybersecurity, 2022
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker.
Yizhe You   +7 more
doaj   +1 more source

The Challenges of Leveraging Threat Intelligence to Stop Data Breaches

open access: yesFrontiers in Computer Science, 2020
Despite the significant increase in cybersecurity solutions investment, organizations are still plagued by security breaches, especially data breaches. As more organizations experience crippling security breaches, the wave of compromised data is growing ...
Amani Ibrahim   +3 more
doaj   +1 more source

Aerosolization of Water Ejected from a Full Container Impacted by Bomb Fragments

open access: yesShock and Vibration, 2012
In assessing the potential collateral effects of bomb attacks on tanks of stored liquids, it is useful to separate the liquid that is aerosolized as an escaping cloud from that which remains inside the tank or rapidly falls to the nearby ground.
Leo W. Stockham   +3 more
doaj   +1 more source

Application of security threat intelligence based on big data analysis in telecom operators

open access: yesDianxin kexue, 2020
As a powerful tool for operators to deal with means of new attack and ever-changing security threats,threat intelligence is also the core power to transform traditional passive defense into active defense.The importance of threat intelligence to ...
Mingxia BO   +3 more
doaj   +2 more sources

Nation-State Threat Actor Attribution Using Fuzzy Hashing

open access: yesIEEE Access, 2023
Recent years have seen a rise in state-sponsored malware. Advanced Persistent Threat groups (APTs) have been waging a covert war with little repercussions due to the clandestine nature of cyberconflict. For sanctions to be imposed, malware attribution is
Michal Kida, Oluwafemi Olukoya
doaj   +1 more source

Asymptotically Unambitious Artificial General Intelligence

open access: yes, 2020
General intelligence, the ability to solve arbitrary solvable problems, is supposed by many to be artificially constructible. Narrow intelligence, the ability to solve a given particularly difficult problem, has seen impressive recent development ...
Cohen, Michael K   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy