Results 41 to 50 of about 546,292 (293)

From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence

open access: yesIEEE Access, 2020
An average medium-sized organisation logs approx. 10 to 500 mln events per day on the system. Only less than 5% of threat alerts are being investigated by the specialised staff, leaving the security hole open for potential attacks.
Neda Afzaliseresht   +4 more
doaj   +1 more source

QBC Inconsistency-Based Threat Intelligence IOC Recognition

open access: yesIEEE Access, 2021
With the increase in cyber-attacks, Cyber Threat Intelligence (CTI) has become a hot topic. Log detection using Indicators of Compromise (IOCs) to detect critical risks, such as compromised internal hosts, is the most common use scenario for CTI ...
Wenli Zeng   +4 more
doaj   +1 more source

Cybercrime threat intelligence

open access: yesComputers and Security, 2021
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is increasing exponentially. To offer an overview of the techniques and indicators to perform cyber crime detection by means of more complex machine- and deep-learning investigations as well as similar threat intelligence and engineering activities over ...
Cascavilla, Giuseppe   +2 more
openaire   +1 more source

Biobased Bionic Spider Silk via Electrostatic Complexation for Simultaneously Harvesting Atmospheric Water and Triboelectric Energy

open access: yesAdvanced Functional Materials, EarlyView.
Bio‐based bionic spider silk and spider web are first prepared using polyelectrolyte complexation technique for the simultaneous harvesting of water and triboelectric energy. The advantage of this process lies on entirely bio‐based materials, fully green water‐processable procedures, extremely high production rate (99.36%), excellent fog harvesting ...
Qin Chen   +9 more
wiley   +1 more source

Cyber Threat Intelligence Platform [PDF]

open access: yes, 2016
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core  

Metal–Organic Frameworks for Gaseous Pollutant Management: From Capture to Neutralization and Reutilization

open access: yesAdvanced Functional Materials, EarlyView.
This review maps how MOFs can manage hazardous gases by combining adsorption, neutralization, and reutilization, enabling sustainable air‐pollution control. Covering chemical warfare agent simulants, SO2, NOx, NH3, H2S, and volatile organic compounds, it highlights structure‐guided strategies that boost selectivity, water tolerance, and cycling ...
Yuanmeng Tian   +8 more
wiley   +1 more source

Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]

open access: yes, 2015
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M   +12 more
core  

The Growing Threat of Agroterrorism and Strategies for Agricultural Defense [PDF]

open access: yes, 2020
Due to the dynamic nature of human conflict, non-traditional terror tactics have evolved to undermine the socioeconomic stability of targeted societies.
Forrest, Alyssa
core   +1 more source

Smart Catheters for Diagnosis, Monitoring, and Therapy

open access: yesAdvanced Healthcare Materials, EarlyView.
This study presents a comprehensive review of smart catheters, an emerging class of medical devices that integrate embedded sensors, robotics, and communication systems, offering increased functionality and complexity to enable real‐time health monitoring, diagnostics, and treatment. Abstract This review explores smart catheters as an emerging class of
Azra Yaprak Tarman   +12 more
wiley   +1 more source

Analysing Language-Based Cyber Threats: An Examination of Cybersecurity for Chinese Text

open access: yesThe Pinnacle
Language barriers can impede effective communication and collaboration among cybersecurity professionals who speak different languages, potentially leading to misinterpretations of security policies, threat intelligence, and incident reports, thereby ...
Bruce Mills
doaj   +1 more source

Home - About - Disclaimer - Privacy