Results 81 to 90 of about 552,762 (243)

A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience. [PDF]

open access: yesSensors (Basel), 2023
Saeed S   +4 more
europepmc   +1 more source

Percolation Model of Insider Threats to Assess the Optimum Number of Rules

open access: yes, 2014
Rules, regulations, and policies are the basis of civilized society and are used to coordinate the activities of individuals who have a variety of goals and purposes.
Gadepally, Vijay   +2 more
core   +1 more source

Towards Proactive Domain Name Security: An Adaptive System for .ro domains Reputation Analysis

open access: yesFuture Internet
In a digital landscape marked by the exponential growth of cyber threats, the development of automated domain reputation systems is extremely important.
Carmen Ionela Rotună   +2 more
doaj   +1 more source

MICRA: A Modular Intelligent Cybersecurity Response Architecture with Machine Learning Integration

open access: yesJournal of Cybersecurity and Privacy
The growing sophistication of cyber threats has posed significant challenges for organizations in terms of accurately detecting and responding to incidents in a coordinated manner.
Alessandro Carvalho Coutinho   +1 more
doaj   +1 more source

Integrating explanation-based and empirical learning methods in OCCAM [PDF]

open access: yes, 1988
This paper discusses an approach to integrating empirical and explanation based learning techniques. The paper focuses on OCCAM, a program that has the capability to acquire via empirical means the knowledge needed for analytical learning.
Pazzani, Michael J.
core  

Distributed Trust in the Age of Malware Blockchain Applications

open access: yesAlgorithms
Blockchain technology is redefining the foundations of cybersecurity by introducing decentralized, tamper-resistant mechanisms for data integrity, trust management, and malware intelligence sharing.
Paul A. Gagniuc   +2 more
doaj   +1 more source

Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform. [PDF]

open access: yesEntropy (Basel), 2022
Ali H   +7 more
europepmc   +1 more source

Automatic Generation of MAEC and STIX Standards for Android Malware Threat Intelligence [PDF]

open access: diamond, 2020
Jungsoo Park   +3 more
openalex   +1 more source

Threat Actor Type Inference and Characterization within Cyber Threat Intelligence [PDF]

open access: green, 2021
Vasileios Mavroeidis   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy