Results 41 to 50 of about 552,762 (243)
From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence
An average medium-sized organisation logs approx. 10 to 500 mln events per day on the system. Only less than 5% of threat alerts are being investigated by the specialised staff, leaving the security hole open for potential attacks.
Neda Afzaliseresht +4 more
doaj +1 more source
QBC Inconsistency-Based Threat Intelligence IOC Recognition
With the increase in cyber-attacks, Cyber Threat Intelligence (CTI) has become a hot topic. Log detection using Indicators of Compromise (IOCs) to detect critical risks, such as compromised internal hosts, is the most common use scenario for CTI ...
Wenli Zeng +4 more
doaj +1 more source
Cyber Threat Intelligence Platform [PDF]
Cieľom práce je vytvoriť webovú platformu, ktorá poskytne zjednodušený popis, spracovanie a výmenu bezpečnostných incidentov za pomoci dostupných štandardov STIX, TAXII, CybOX, IDEA.
Jacko, Jerguš
core
The Growing Threat of Agroterrorism and Strategies for Agricultural Defense [PDF]
Due to the dynamic nature of human conflict, non-traditional terror tactics have evolved to undermine the socioeconomic stability of targeted societies.
Forrest, Alyssa
core +1 more source
PDF-Malware Detection: A Survey and Taxonomy of Current Techniques [PDF]
Portable Document Format, more commonly known as PDF, has become, in the last 20 years, a standard for document exchange and dissemination due its portable nature and widespread adoption. The flexibility and power of this format are not only leveraged by
Aniello, L. +3 more
core +1 more source
Analysing Language-Based Cyber Threats: An Examination of Cybersecurity for Chinese Text
Language barriers can impede effective communication and collaboration among cybersecurity professionals who speak different languages, potentially leading to misinterpretations of security policies, threat intelligence, and incident reports, thereby ...
Bruce Mills
doaj +1 more source
Machine-assisted Cyber Threat Analysis using Conceptual Knowledge Discovery [PDF]
Over the last years, computer networks have evolved into highly dynamic and interconnected environments, involving multiple heterogeneous devices and providing a myriad of services on top of them.
ALIQUINTUY, M +12 more
core
Surprise, Intelligence Failure, and Mass Casualty Terrorism [PDF]
This study aims to evaluate whether surprise and intelligence failure leading to mass casualty terrorism are inevitable. It explores the extent to which four factors - failures of public policy leadership, analytical challenges, organizational obstacles,
Copeland, Thomas Edgar
core
Unstructured Big Data Threat Intelligence Parallel Mining Algorithm
To efficiently mine threat intelligence from the vast array of open-source cybersecurity analysis reports on the web, we have developed the Parallel Deep Forest-based Multi-Label Classification (PDFMLC) algorithm.
Zhihua Li +3 more
doaj +1 more source
With the development of information technology, the need to solve the problem of information security has increased, as it has become the most important strategic resource.
Bohdan Nikolaienko, Serhii Vasylenko
doaj +1 more source

