|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 17 occurrences of 8 keywords
|
|
|
Results
Found 497 publication records. Showing 497 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
128 | Sangho Lee, Dong Hwi Lee, Kuinam J. Kim |
A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Cyber-threat, TMS, Early-Warning, ESM |
57 | Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park |
Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. |
ISPA Workshops |
2006 |
DBLP DOI BibTeX RDF |
Vicious Attack, Early Warining, Routing Information, Intrusion Detection System |
51 | Kazuhiro Ohno, Hideki Koike, Kanba Koizumi |
IPMatrix: An Effective Visualization Framework for Cyber Threat Monitoring. |
IV |
2005 |
DBLP DOI BibTeX RDF |
information visualization, intrusion detection, information security, Internet worm, computer virus |
50 | Yusuke Hideshima, Hideki Koike |
STARMINE: a visualization system for cyber attacks. |
APVIS |
2006 |
DBLP DOI BibTeX RDF |
virus visualization, information visualization, intrusion detection, information security, internet worm |
46 | Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee |
Cyber Threat Trend Analysis Model Using HMM. |
IAS |
2007 |
DBLP DOI BibTeX RDF |
|
34 | Hideki Koike, Kazuhiro Ohno, Kanba Koizumi |
Visualizing Cyber Attacks using IP Matrix. |
VizSEC |
2005 |
DBLP DOI BibTeX RDF |
virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus |
33 | Vasileios Mavroeidis, Siri Bromander |
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
33 | Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song |
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. |
ICDE |
2021 |
DBLP DOI BibTeX RDF |
|
33 | Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song |
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
33 | Matthew Hull, Thaddeus Eze, Lee Speakman |
Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond. |
EISIC |
2018 |
DBLP DOI BibTeX RDF |
|
33 | Vasileios Mavroeidis, Siri Bromander |
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. |
EISIC |
2017 |
DBLP DOI BibTeX RDF |
|
30 | Joshua A. Sipper |
Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. |
Cyber Security |
2020 |
DBLP DOI BibTeX RDF |
|
27 | Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla |
TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Tongtong Jiang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Bo Xie |
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. |
Comput. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Ángel Casanova Bienzobas, Alfonso Sánchez-Macián |
Threat Trekker: An Approach to Cyber Threat Hunting. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Kelsie Edie, Cole Mckee, Adam Duby |
Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT Attribution. |
ISDFS |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Cláudio Martins, Ibéria Medeiros |
Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. |
ACM Trans. Priv. Secur. |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Peng Gao 0008, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang, Zhengjie Ji, Zilin Zhang, Dawn Song |
ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management. |
CoRR |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams |
What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang |
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
27 | Huixia Zhang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Chaohui Jiang |
EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. |
Secur. Commun. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Clemens Sauerwein, Daniel Fischer 0003, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu |
From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. |
ARES |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang |
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. |
CyCon |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Peter Amthor 0001, Daniel Fischer 0003, Winfried E. Kühnhauser, Dirk Stelzer |
Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. |
ARES |
2019 |
DBLP DOI BibTeX RDF |
|
27 | Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer |
Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. |
ISI |
2018 |
DBLP DOI BibTeX RDF |
|
27 | John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen |
Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. |
ISI |
2017 |
DBLP DOI BibTeX RDF |
|
27 | Jan M. Ahrend, Marina Jirotka, Kevin Jones |
On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge. |
CyberSA |
2016 |
DBLP DOI BibTeX RDF |
|
23 | Ehtisham Ul Haque, Waseem Abbasi, Sathishkumar Murugesan, Muhammad Shahid Anwar, Faheem Khan, Youngmoon Lee |
Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey, Vivek Kumar 0007 |
Towards Safe Cyber Practices: Developing a Proactive Cyber-Threat Intelligence System for Dark Web Forum Content by Identifying Cybercrimes. |
Inf. |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Christian Ellerhold, Johann Schnagl, Thomas Schreck |
Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification. |
CCSW@CCS |
2023 |
DBLP DOI BibTeX RDF |
|
23 | Abel Yeboah-Ofori, Shareeful Islam, Sin Wee Lee, Zia Ush-Shamszaman, Khan Muhammad 0001, Meteb Altaf, Mabrook S. Al-Rakhami |
Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. |
IEEE Access |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Hinne Hettema |
Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence. |
Comput. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Md. Farhan Haque, Ram Krishnan |
Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence. |
Inf. Syst. Frontiers |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Chris Nichols, Geoff Stoker, Ulku Clark |
Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk. |
HCI (27) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Yazid Merah, Tayeb Kenaza |
Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence. |
ARES |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Marc-André Kaufhold, Jennifer Fromm, Thea Riebe, Milad Mirbabaie, Philipp Kühn 0001, Ali Sercan Basyurt, Markus Bayer, Marc Stöttinger, Kaan Eyilmez, Reinhard Möller 0004, Christoph Fuchß, Stefan Stieglitz, Christian Reuter 0001 |
CYWARN: Strategy and Technology Development for Cross-Platform Cyber Situational Awareness and Actor-Specific Cyber Threat Communication. |
MuC (Workshopband) |
2021 |
DBLP DOI BibTeX RDF |
|
23 | Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis, George Hatzivasilis |
Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models. |
MSTEC |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Aliyu Aliyu, Ying He 0004, Iryna Yevseyeva, Cunjin Luo |
Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster. |
CNS |
2020 |
DBLP DOI BibTeX RDF |
|
23 | Shahriar Badsha, Iman Vakilinia, Shamik Sengupta |
Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense. |
CCWC |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Wenzhuo Yang, Kwok-Yan Lam |
Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC. |
ICICS |
2019 |
DBLP DOI BibTeX RDF |
|
23 | Elias Bou-Harb, Walter Lucia, Nicola Forti, Sean Weerakkody, Nasir Ghani, Bruno Sinopoli |
Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence. |
IEEE Commun. Mag. |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Deepak K. Tosh, Sachin Shetty, Shamik Sengupta, Jay P. Kesan, Charles A. Kamhoua |
Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance. |
GAMENETS |
2017 |
DBLP DOI BibTeX RDF |
|
23 | Bright Gameli Mawudor |
Present Cyber Threat Management (Methodologies to Mitigate Evolving Cyber-Attacks). |
AsiaJCIS |
2013 |
DBLP DOI BibTeX RDF |
|
23 | Suzanne Hassell, Paul Beraud, Alen Cruz, Gangadhar Ganga, Steve Martin 0002, Justin Toennies, Pablo Vazquez, Gary Wright, Daniel Gomez, Frank Pietryka, Niraj Srivastava, Travis Hester, David Hyde 0002, Brian Mastropietro |
Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation. |
MILCOM |
2012 |
DBLP DOI BibTeX RDF |
|
23 | John R. Goodall |
Introduction to Visualization for Computer Security. |
VizSEC |
2007 |
DBLP DOI BibTeX RDF |
|
17 | Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi |
Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. |
Int. J. Inf. Sec. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Peng Xiao |
Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning. |
J. Cyber Secur. Mobil. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Yang Zhang, Jiarui Chen, Zhe Cheng, Xiong Shen, Jiancheng Qin, Yingzheng Han, Yiqin Lu |
Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph. |
Inf. Sci. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable, Narinderjit Singh Thandi |
Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, Pranav M. Pawar |
SmartSentry: Cyber Threat Intelligence in Industrial IoT. |
IEEE Access |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Fahim K. Sufi |
A New Time Series Dataset for Cyber-Threat Correlation, Regression and Neural-Network-Based Forecasting. |
Inf. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Dimitrios Chatziamanetoglou, Konstantinos Rantos |
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review. |
Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Huma Gupta, Sanjeev Sharma, Sanjay Agrawal |
Artificial Intelligence-Based Anomalies Detection Scheme for Identifying Cyber Threat on IoT-Based Transport Network. |
IEEE Trans. Consumer Electron. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Sarah Alharbi, Arshiya Khan |
Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Koen T. W. Teuwen |
A Modular Approach to Automatic Cyber Threat Attribution using Opinion Pools. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Lampis Alevizos, Martijn Dekker |
Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Prasasthy Balasubramanian, Sadaf Nazari, Danial Khosh Kholgh, Alireza Mahmoodi, Justin Seby, Panos Kostakos 0001 |
TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in the Wild. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | William P. Maxam III, James C. Davis 0001 |
An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security. |
CoRR |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Vitor Jesus, Balraj Bains, Victor Chang 0001 |
Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence. |
IEEE Trans. Engineering Management |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu |
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Wenhan Ge, Junfeng Wang 0003 |
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. |
Comput. J. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Yi-Fan Li, Yang Gao 0027, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham |
Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. |
IEEE Trans. Dependable Secur. Comput. |
2024 |
DBLP DOI BibTeX RDF |
|
17 | Varol O. Kayhan, Manish Agrawal, Shivendu Shivendu |
Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC). |
Decis. Support Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos |
An autoML network traffic analyzer for cyber threat detection. |
Int. J. Inf. Sec. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Lampis Alevizos, Eliana Stavrou |
Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS). |
Inf. Secur. J. A Glob. Perspect. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Oleksii Osliak, Andrea Saracino, Fabio Martinelli, Paolo Mori |
Cyber threat intelligence for critical infrastructure security. |
Concurr. Comput. Pract. Exp. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Po-Ching Lin, Wen-Hao Hsu, Ying-Dar Lin, Ren-Hung Hwang, Hsiao-Kuang Wu, Yuan-Cheng Lai, Chung-Kuan Chen |
Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation. |
Comput. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Renato Marinho, Raimir Holanda |
Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Othmane Cherqi, Youness Moukafih, Mounir Ghogho, Houda Benbrahim |
Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds Through an Improved Semi-Supervised Generative Adversarial Learning Approach With Contrastive Learning. |
IEEE Access |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Iram Bibi, Adnan Akhunzada, Neeraj Kumar 0001 |
Deep AI-Powered Cyber Threat Analysis in IIoT. |
IEEE Internet Things J. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Tim Ackermann, Markus Karch, Jörg Kippe |
Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks. |
Autom. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Tarek Moulahi, Rateb Jabbar, Abdulatif Alabdulatif, Sidra Abbas, Salim El Khediri, Salah Zidi, Muhammad Rizwan 0005 |
Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security. |
Expert Syst. J. Knowl. Eng. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Divya Ramachandran, Mubarak Albathan, Ayyaz Hussain, Qaisar Abbas |
Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model. |
Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha |
An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things. |
Comput. Commun. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Zong-Xun Li, Yu-Jun Li, Yi-Wei Liu, Cheng Liu, Nan-Xin Zhou |
K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph. |
Symmetry |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Prabhat Kumar 0003, Govind P. Gupta, Rakesh Tripathi, Sahil Garg, Mohammad Mehedi Hassan |
DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems. |
IEEE Trans. Intell. Transp. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour |
An ensemble deep learning model for cyber threat hunting in industrial internet of things. |
Digit. Commun. Networks |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Pankaj Kumar, Mohammad Wazid, Devesh Pratap Singh, Jaskaran Singh, Ashok Kumar Das, Youngho Park 0005, Joel J. P. C. Rodrigues |
Explainable artificial intelligence envisioned security mechanism for cyber threat hunting. |
Secur. Priv. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Yuhuang Huang, Mang Su, Yuting Xu, Tian Liu |
NER in Cyber Threat Intelligence Domain Using Transformer with TSGL. |
J. Circuits Syst. Comput. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Nan Sun 0002, Ming Ding 0001, Jiaojiao Jiang, Weikang Xu, Xiaoxing Mo, Yonghang Tai, Jun Zhang 0010 |
Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives. |
IEEE Commun. Surv. Tutorials |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Meryem Ammi |
Cyber Threat Hunting Case Study using MISP. |
J. Internet Serv. Inf. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Akinyemi Bodunde Odunola, Dauda Akinwuyi Olalere, Mistura Laide Sanni, Emmanuel Ajayi Olajubu, Ganiyu Adesola Aderounmu, Isa Ibrahim Ali |
Performance Evaluation of Machine Learning Models for Cyber Threat Detection and Prevention in Mobile Money Services. |
Informatica (Slovenia) |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann |
Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection. |
J. Netw. Syst. Manag. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Tran Duc Luong, Vuong Minh Tien, Nguyen Huu Quyen, Do Thi Thu Hien, Phan The Duy, Van-Hau Pham |
Fed-LSAE: Thwarting Poisoning Attacks against Federated Cyber Threat Detection System via Autoencoder-based Latent Space Inspection. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde |
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Giuseppe Siracusano, Davide Sanvito, Roberto Gonzalez, Manikantan Srinivasan, Sivakaman Kamatchi, Wataru Takahashi 0002, Masaru Kawakita, Takahiro Kakumaru, Roberto Bifulco |
Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable |
Revolutionizing Cyber Threat Detection with Large Language Models. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem |
A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid |
A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Mohamed Amine Ferrag, Djallel Hamouda, Mérouane Debbah, Leandros A. Maglaras, Abderrahmane Lakas |
Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Mohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh |
Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., P. Vinod 0001, Mauro Conti |
NLP-Based Techniques for Cyber Threat Intelligence. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos |
A Cyber Threat Intelligence Management Platform for Industrial Environments. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Taofeek Mobolarinwa Balogun, Hayretdin Bahsi, Omer F. Keskin, Unal Tatar |
A comparative framework for cyber threat modelling: case of healthcare and industrial control systems. |
Int. J. Crit. Infrastructures |
2023 |
DBLP DOI BibTeX RDF |
|
17 | |
Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | |
Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | |
Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | |
Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. |
J. Comput. Virol. Hacking Tech. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | James Kotsias, Atif Ahmad, Rens Scheepers |
Adopting and integrating cyber-threat intelligence in a commercial organisation. |
Eur. J. Inf. Syst. |
2023 |
DBLP DOI BibTeX RDF |
|
17 | Markus Bayer, Tobias Frey, Christian Reuter 0001 |
Multi-level fine-tuning, data augmentation, and few-shot learning for specialized cyber threat intelligence. |
Comput. Secur. |
2023 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 497 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ >>] |
|