A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. [PDF]
Saeed S +4 more
europepmc +1 more source
Percolation Model of Insider Threats to Assess the Optimum Number of Rules
Rules, regulations, and policies are the basis of civilized society and are used to coordinate the activities of individuals who have a variety of goals and purposes.
Gadepally, Vijay +2 more
core +1 more source
Towards Proactive Domain Name Security: An Adaptive System for .ro domains Reputation Analysis
In a digital landscape marked by the exponential growth of cyber threats, the development of automated domain reputation systems is extremely important.
Carmen Ionela Rotună +2 more
doaj +1 more source
MICRA: A Modular Intelligent Cybersecurity Response Architecture with Machine Learning Integration
The growing sophistication of cyber threats has posed significant challenges for organizations in terms of accurately detecting and responding to incidents in a coordinated manner.
Alessandro Carvalho Coutinho +1 more
doaj +1 more source
Integrating explanation-based and empirical learning methods in OCCAM [PDF]
This paper discusses an approach to integrating empirical and explanation based learning techniques. The paper focuses on OCCAM, a program that has the capability to acquire via empirical means the knowledge needed for analytical learning.
Pazzani, Michael J.
core
Distributed Trust in the Age of Malware Blockchain Applications
Blockchain technology is redefining the foundations of cybersecurity by introducing decentralized, tamper-resistant mechanisms for data integrity, trust management, and malware intelligence sharing.
Paul A. Gagniuc +2 more
doaj +1 more source
Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. [PDF]
Ali H +7 more
europepmc +1 more source
Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence [PDF]
Jungsoo Park +3 more
openalex +1 more source
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence [PDF]
Vasileios Mavroeidis +3 more
openalex +1 more source
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning. [PDF]
Ghaleb FA +4 more
europepmc +1 more source

