Results 61 to 70 of about 552,762 (243)
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph [PDF]
LI Zong-xun +4 more
openalex +1 more source
Action Stories for Counter Terrorism (extended abstract) [PDF]
Due to the raised terrorist threat worldwide, there is an urgent need to research that assists security and police services to protect the public and key assets and to prevent attacks from taking place.
Guest, E
core
Countering Social Engineering through Social Media: An Enterprise Security Perspective
The increasing threat of social engineers targeting social media channels to advance their attack effectiveness on company data has seen many organizations introducing initiatives to better understand these vulnerabilities.
C Colwill +8 more
core +1 more source
A Novel Threat Intelligence Information Extraction System Combining Multiple Models [PDF]
Yongfei Li +4 more
openalex +1 more source
Network security situational awareness model based on threat intelligence
In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awareness, and the situational awareness ...
Hongbin ZHANG +3 more
doaj +2 more sources
The rapid advancements in artificial intelligence (AI) and machine learning (ML) have significantly influenced the cybersecurity landscape, particularly in the banking sector, where threats are increasingly sophisticated.
Hewa Majeed Zangana +2 more
doaj +1 more source
Technological Threat Attribution, Trust and Confidence, and the Contestability of National Security Policy [PDF]
The world has been asked to believe that China is a source of cyberthreat and that Russia is meddling in U.S. elections. Western populations are being asked to trust the words of intelligence agencies and world leaders that these unspecified ...
Hoverd, W
core
The Internet of things (IoT) is revolutionizing the management and control of automated systems leading to a paradigm shift in areas such as smart homes, smart cities, health care, transportation, etc.
brauer +5 more
core +1 more source
Analysing Technique Classification Performance of Cyber Threat Intelligence Extractors
H. N. Nguyen
openalex +1 more source
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild [PDF]
Giuseppe Siracusano +8 more
openalex +1 more source

