We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 4,182 results
  1. Cyber threat intelligence: existing benefits and challenges for law firms and businesses

    Globally, cyber threats have increased both in frequency and sophistication. For this reason, companies and law firms alike need to respond by...

    Fabian M. Teichmann, Sonia R. Boticiu in International Cybersecurity Law Review
    Article 05 April 2024
  2. An efficient cyber threat prediction using a novel artificial intelligence technique

    Digital applications are ruling today's world with their advancement. However, offering security for that digital application is an important and...

    Pankaj Sharma, Jay Shankar Prasad, ... Shaik Khaleel Ahamed in Multimedia Tools and Applications
    Article 25 January 2024
  3. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle

    The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber...

    Alexandros Zacharis, Vasilios Katos, Constantinos Patsakis in International Journal of Information Security
    Article Open access 10 May 2024
  4. Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing

    The increasing frequency of cyberattacks by criminal and state-sponsored actors, has elevated the importance of cyber threat intelligence for...
    Muhammad A. Nainna, Julian M. Bass, Lee Speakman in Information Systems
    Conference paper 2024
  5. Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection

    The uses of machine learning (ML) technologies in the detection of network attacks have been proven to be effective when designed and evaluated using...

    Mohanad Sarhan, Siamak Layeghy, ... Marius Portmann in Journal of Network and Systems Management
    Article Open access 07 October 2022
  6. Cyber Threat Intelligence Analysis for Situational Understanding in Autonomous Transport Systems

    Autonomous transport systems promise to change how mobility is serviced, with potential ramifications in how cities and societies function. Among...
    Chapter 2024
  7. Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence

    Cloud technologies have several merits including the elimination of cost incurred when traditional technologies are adopted. Despite the benefits,...

    Meryem Ammi, Oluwasegun Adedugbe, ... Elhadj Benkhelifa in Cluster Computing
    Article 20 April 2022
  8. The LeWiS Method: Target Variable Estimation Using Cyber Security Intelligence

    Information technology plays an increasingly important role in the provision of essential services. For these systems and networks to be reliable and...

    Leigh Chase, Alaa Mohasseb, Benjamin Aziz in SN Computer Science
    Article 18 April 2024
  9. TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network

    The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with detailed threat attack procedures and indicators of...

    Jian Liu, Junjie Yan, ... Ning Li in Cybersecurity
    Article Open access 02 April 2022
  10. RETRACTED ARTICLE: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry

    Today, artificial intelligence (AI) can be found in nearly every aspect of travel and tourism, from personalization and recommendation systems to...

    Article 22 August 2022
  11. An autoML network traffic analyzer for cyber threat detection

    Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core...

    Alexandros Papanikolaou, Aggelos Alevizopoulos, ... Konstantinos Rantos in International Journal of Information Security
    Article 21 May 2023
  12. Cyber threat assessment and management for securing healthcare ecosystems using natural language processing

    The healthcare sectors have constantly faced significant challenge due to the rapid rise of cyber threats. These threats can pose any potential risk...

    Stefano Silvestri, Shareful Islam, ... Mario Ciampi in International Journal of Information Security
    Article Open access 27 October 2023
  13. Cyber Threat Intelligence (CTI): An Analysis on the Use of Artificial Intelligence and Machine Learning to Identify Cyber Hazards

    Data transport volume and scope on networks are growing daily due to the quick advancements in network technology. It is challenging for...
    Neelima Kant, Amrita in Cyber Security and Digital Forensics
    Conference paper 2024
  14. CyTIE: Cyber Threat Intelligence Extraction with Named Entity Recognition

    In the dynamic intersection of Natural Language Processing and cyber security, Named Entity Recognition plays a pivotal role in comprehending and...
    P. C. Aravind, Dincy R. Arikkat, ... P. Vinod in Advancements in Smart Computing and Information Security
    Conference paper 2024
  15. RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation

    Security defense automation uses technology that reduces human assistance to integrate security applications, processes, and infrastructure. In the...

    Feilu Hang, Linjiang **e, ... Hanruo Li in Journal of Computer Virology and Hacking Techniques
    Article 06 August 2022
  16. Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth

    Recent innovations in the smart city domain have led to the proposition of a new mode of transportation utilizing Autonomous Passenger Ships (APS) or...

    Ahmed Amro, Vasileios Gkioulos in International Journal of Information Security
    Article Open access 23 November 2022
  17. Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security

    The volume of data generated by today’s digitally connected world is enormous, and a significant portion of it is publicly available. These data...

    Ashok Yadav, Atul Kumar, Vrijendra Singh in Artificial Intelligence Review
    Article 15 March 2023
  18. Actionable Cyber Threat Intelligence for Automated Incident Response

    Applying Cyber Threat Intelligence for active cyber defence, while potentially very beneficial, is currently limited to predominantly manual use. In...
    Cristoffer Leite, Jerry den Hartog, ... Elisa Costante in Secure IT Systems
    Conference paper 2022
  19. An Empirical Evaluation of Cyber Threat Intelligence Sharing in the ECHO Early Warning System

    This paper reports on the information sharing practices of cyber competency centres representing different sectors and constituencies. The cyber...
    Ioannis Chalkias, Cagatay Yucel, ... Vasilis Katos in Digital Transformation, Cyber Security and Resilience
    Conference paper 2024
  20. A Roadmap for SMEs to Adopt an AI Based Cyber Threat Intelligence

    Cybersecurity has started to become the most significant concern among organizations as the number of threats and criminal activities in the past...
    Abhilash J. Varma, Nasser Taleb, ... Muhammad Alshurideh in The Effect of Information Technology on Business and Marketing Intelligence Systems
    Chapter 2023
Did you find what you were looking for? Share feedback.