The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase Cyber-threat (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
2005-2011 (18) 2012-2015 (19) 2016 (15) 2017 (23) 2018 (33) 2019 (52) 2020 (48) 2021 (88) 2022 (87) 2023 (96) 2024 (18)
Publication types (Num. hits)
article(208) book(2) data(1) incollection(2) inproceedings(271) phdthesis(13)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 17 occurrences of 8 keywords

Results
Found 497 publication records. Showing 497 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
128Sangho Lee, Dong Hwi Lee, Kuinam J. Kim A Conceptual Design of Knowledge-Based Real-Time Cyber-Threat Early Warning System. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cyber-threat, TMS, Early-Warning, ESM
57Dong Hwi Lee, Kyong Ho Choi, Kuinam J. Kim, Sang Min Park Routing Information System and HOIDS for Detection Method of Vicious Attack in Large Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Vicious Attack, Early Warining, Routing Information, Intrusion Detection System
51Kazuhiro Ohno, Hideki Koike, Kanba Koizumi IPMatrix: An Effective Visualization Framework for Cyber Threat Monitoring. Search on Bibsonomy IV The full citation details ... 2005 DBLP  DOI  BibTeX  RDF information visualization, intrusion detection, information security, Internet worm, computer virus
50Yusuke Hideshima, Hideki Koike STARMINE: a visualization system for cyber attacks. Search on Bibsonomy APVIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF virus visualization, information visualization, intrusion detection, information security, internet worm
46Do-Hoon Kim, Taek Lee, Sung-Oh David Jung, Hoh Peter In, Heejo Lee Cyber Threat Trend Analysis Model Using HMM. Search on Bibsonomy IAS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
34Hideki Koike, Kazuhiro Ohno, Kanba Koizumi Visualizing Cyber Attacks using IP Matrix. Search on Bibsonomy VizSEC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF virus visualization, worm visualization, Internet forecasting, information visualization, intrusion detection, information security, Internet worm, computer virus
33Vasileios Mavroeidis, Siri Bromander Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
33Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. Search on Bibsonomy ICDE The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
33Peng Gao 0008, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
33Matthew Hull, Thaddeus Eze, Lee Speakman Policing The Cyber Threat: Exploring the Threat from Cyber Crime and the Ability of Local Law Enforcement to Respond. Search on Bibsonomy EISIC The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
33Vasileios Mavroeidis, Siri Bromander Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence. Search on Bibsonomy EISIC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
30Joshua A. Sipper Cyber Threat Intelligence and the Cyber Meta-Reality and Cyber Microbiome. Search on Bibsonomy Cyber Security The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
27Nanda Rani, Bikash Saha, Vikas Maurya, Sandeep Kumar Shukla TTPXHunter: Actionable Threat Intelligence Extraction as TTPs from Finished Cyber Threat Reports. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
27Tongtong Jiang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Bo Xie BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Ángel Casanova Bienzobas, Alfonso Sánchez-Macián Threat Trekker: An Approach to Cyber Threat Hunting. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Kelsie Edie, Cole Mckee, Adam Duby Extending Threat Playbooks for Cyber Threat Intelligence: A Novel Approach for APT Attribution. Search on Bibsonomy ISDFS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
27Cláudio Martins, Ibéria Medeiros Generating Quality Threat Intelligence Leveraging OSINT and a Cyber Threat Unified Taxonomy. Search on Bibsonomy ACM Trans. Priv. Secur. The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Peng Gao 0008, Xiaoyuan Liu, Edward Choi, Sibo Ma, Xinyu Yang, Zhengjie Ji, Zilin Zhang, Dawn Song ThreatKG: A Threat Knowledge Graph for Automated Open-Source Cyber Threat Intelligence Gathering and Management. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
27Md. Rayhanur Rahman, Rezvan Mahdavi-Hezaveh, Laurie A. Williams What are the attackers doing now? Automating cyber threat intelligence extraction from text on pace with the changing threat landscape: A survey. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
27Huixia Zhang, Guowei Shen, Chun Guo 0004, Yunhe Cui, Chaohui Jiang EX-Action: Automatically Extracting Threat Actions from Cyber Threat Intelligence Report Based on Multimodal Learning. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Clemens Sauerwein, Daniel Fischer 0003, Milena Rubsamen, Guido Rosenberger, Dirk Stelzer, Ruth Breu From Threat Data to Actionable Intelligence: An Exploratory Analysis of the Intelligence Cycle Implementation in Cyber Threat Intelligence Sharing Platforms. Search on Bibsonomy ARES The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. Search on Bibsonomy CyCon The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
27Peter Amthor 0001, Daniel Fischer 0003, Winfried E. Kühnhauser, Dirk Stelzer Automated Cyber Threat Sensing and Responding: Integrating Threat Intelligence into Security-Policy-Controlled Systems. Search on Bibsonomy ARES The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
27Ghaith Husari, Xi Niu, Bill Chu, Ehab Al-Shaer Using Entropy and Mutual Information to Extract Threat Actions from Cyber Threat Intelligence. Search on Bibsonomy ISI The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
27John Grisham, Sagar Samtani, Mark W. Patton, Hsinchun Chen Identifying mobile malware and key threat actors in online hacker forums for proactive cyber threat intelligence. Search on Bibsonomy ISI The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
27Jan M. Ahrend, Marina Jirotka, Kevin Jones On the collaborative practices of cyber threat intelligence analysts to develop and utilize tacit Threat and Defence Knowledge. Search on Bibsonomy CyberSA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
23Ehtisham Ul Haque, Waseem Abbasi, Sathishkumar Murugesan, Muhammad Shahid Anwar, Faheem Khan, Youngmoon Lee Cyber Forensic Investigation Infrastructure of Pakistan: An Analysis of the Cyber Threat Landscape and Readiness. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey, Vivek Kumar 0007 Towards Safe Cyber Practices: Developing a Proactive Cyber-Threat Intelligence System for Dark Web Forum Content by Identifying Cybercrimes. Search on Bibsonomy Inf. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Christian Ellerhold, Johann Schnagl, Thomas Schreck Enterprise Cyber Threat Modeling and Simulation of Loss Events for Cyber Risk Quantification. Search on Bibsonomy CCSW@CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
23Abel Yeboah-Ofori, Shareeful Islam, Sin Wee Lee, Zia Ush-Shamszaman, Khan Muhammad 0001, Meteb Altaf, Mabrook S. Al-Rakhami Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security. Search on Bibsonomy IEEE Access The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Hinne Hettema Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence. Search on Bibsonomy Comput. Secur. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Md. Farhan Haque, Ram Krishnan Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence. Search on Bibsonomy Inf. Syst. Frontiers The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Chris Nichols, Geoff Stoker, Ulku Clark Heuristic Evaluation of Vulnerability Risk Management Leaders' Presentations of Cyber Threat and Cyber Risk. Search on Bibsonomy HCI (27) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Yazid Merah, Tayeb Kenaza Ontology-based Cyber Risk Monitoring Using Cyber Threat Intelligence. Search on Bibsonomy ARES The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Marc-André Kaufhold, Jennifer Fromm, Thea Riebe, Milad Mirbabaie, Philipp Kühn 0001, Ali Sercan Basyurt, Markus Bayer, Marc Stöttinger, Kaan Eyilmez, Reinhard Möller 0004, Christoph Fuchß, Stefan Stieglitz, Christian Reuter 0001 CYWARN: Strategy and Technology Development for Cross-Platform Cyber Situational Awareness and Actor-Specific Cyber Threat Communication. Search on Bibsonomy MuC (Workshopband) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
23Michail Smyrlis, Konstantinos Fysarakis, George Spanoudakis, George Hatzivasilis Cyber Range Training Programme Specification Through Cyber Threat and Training Preparation Models. Search on Bibsonomy MSTEC The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Aliyu Aliyu, Ying He 0004, Iryna Yevseyeva, Cunjin Luo Cyber Security Decision Making Informed by Cyber Threat Intelligence (CYDETI) : IEEE CNS 20 Poster. Search on Bibsonomy CNS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Shahriar Badsha, Iman Vakilinia, Shamik Sengupta Privacy Preserving Cyber Threat Information Sharing and Learning for Cyber Defense. Search on Bibsonomy CCWC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Wenzhuo Yang, Kwok-Yan Lam Automated Cyber Threat Intelligence Reports Classification for Early Warning of Cyber Attacks in Next Generation SOC. Search on Bibsonomy ICICS The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Elias Bou-Harb, Walter Lucia, Nicola Forti, Sean Weerakkody, Nasir Ghani, Bruno Sinopoli Cyber Meets Control: A Novel Federated Approach for Resilient CPS Leveraging Real Cyber Threat Intelligence. Search on Bibsonomy IEEE Commun. Mag. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Deepak K. Tosh, Sachin Shetty, Shamik Sengupta, Jay P. Kesan, Charles A. Kamhoua Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance. Search on Bibsonomy GAMENETS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
23Bright Gameli Mawudor Present Cyber Threat Management (Methodologies to Mitigate Evolving Cyber-Attacks). Search on Bibsonomy AsiaJCIS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
23Suzanne Hassell, Paul Beraud, Alen Cruz, Gangadhar Ganga, Steve Martin 0002, Justin Toennies, Pablo Vazquez, Gary Wright, Daniel Gomez, Frank Pietryka, Niraj Srivastava, Travis Hester, David Hyde 0002, Brian Mastropietro Evaluating network cyber resiliency methods using cyber threat, Vulnerability and Defense Modeling and Simulation. Search on Bibsonomy MILCOM The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
23John R. Goodall Introduction to Visualization for Computer Security. Search on Bibsonomy VizSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
17Stefano Silvestri, Shareful Islam, Dmitry Amelin, Gabriele Weiler, Spyridon Papastergiou, Mario Ciampi Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Peng Xiao Malware Cyber Threat Intelligence System for Internet of Things (IoT) Using Machine Learning. Search on Bibsonomy J. Cyber Secur. Mobil. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Yang Zhang, Jiarui Chen, Zhe Cheng, Xiong Shen, Jiancheng Qin, Yingzheng Han, Yiqin Lu Edge propagation for link prediction in requirement-cyber threat intelligence knowledge graph. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable, Narinderjit Singh Thandi Revolutionizing Cyber Threat Detection With Large Language Models: A Privacy-Preserving BERT-Based Lightweight Model for IoT/IIoT Devices. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Sapna Sadhwani, Urvi Kavan Modi, Raja Muthalagu, Pranav M. Pawar SmartSentry: Cyber Threat Intelligence in Industrial IoT. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Fahim K. Sufi A New Time Series Dataset for Cyber-Threat Correlation, Regression and Neural-Network-Based Forecasting. Search on Bibsonomy Inf. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Dimitrios Chatziamanetoglou, Konstantinos Rantos Cyber Threat Intelligence on Blockchain: A Systematic Literature Review. Search on Bibsonomy Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Huma Gupta, Sanjeev Sharma, Sanjay Agrawal Artificial Intelligence-Based Anomalies Detection Scheme for Identifying Cyber Threat on IoT-Based Transport Network. Search on Bibsonomy IEEE Trans. Consumer Electron. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Sarah Alharbi, Arshiya Khan Ensemble Defense System: A Hybrid IDS Approach for Effective Cyber Threat Detection. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Koen T. W. Teuwen A Modular Approach to Automatic Cyber Threat Attribution using Opinion Pools. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Lampis Alevizos, Martijn Dekker Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Prasasthy Balasubramanian, Sadaf Nazari, Danial Khosh Kholgh, Alireza Mahmoodi, Justin Seby, Panos Kostakos 0001 TSTEM: A Cognitive Platform for Collecting Cyber Threat Intelligence in the Wild. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17William P. Maxam III, James C. Davis 0001 An Interview Study on Third-Party Cyber Threat Hunting Processes in the U.S. Department of Homeland Security. Search on Bibsonomy CoRR The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Vitor Jesus, Balraj Bains, Victor Chang 0001 Sharing Is Caring: Hurdles and Prospects of Open, Crowd-Sourced Cyber Threat Intelligence. Search on Bibsonomy IEEE Trans. Engineering Management The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Wenhan Ge, Junfeng Wang 0003 SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. Search on Bibsonomy Comput. J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Yi-Fan Li, Yang Gao 0027, Gbadebo Ayoade, Latifur Khan, Anoop Singhal, Bhavani Thuraisingham Heterogeneous Domain Adaptation for Multistream Classification on Cyber Threat Data. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
17Varol O. Kayhan, Manish Agrawal, Shivendu Shivendu Cyber threat detection: Unsupervised hunting of anomalous commands (UHAC). Search on Bibsonomy Decis. Support Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos An autoML network traffic analyzer for cyber threat detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Lampis Alevizos, Eliana Stavrou Cyber threat modeling for protecting the crown jewels in the Financial Services Sector (FSS). Search on Bibsonomy Inf. Secur. J. A Glob. Perspect. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Oleksii Osliak, Andrea Saracino, Fabio Martinelli, Paolo Mori Cyber threat intelligence for critical infrastructure security. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Po-Ching Lin, Wen-Hao Hsu, Ying-Dar Lin, Ren-Hung Hwang, Hsiao-Kuang Wu, Yuan-Cheng Lai, Chung-Kuan Chen Correlation of cyber threat intelligence with sightings for intelligence assessment and augmentation. Search on Bibsonomy Comput. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Renato Marinho, Raimir Holanda Automated Emerging Cyber Threat Identification and Profiling Based on Natural Language Processing. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Othmane Cherqi, Youness Moukafih, Mounir Ghogho, Houda Benbrahim Enhancing Cyber Threat Identification in Open-Source Intelligence Feeds Through an Improved Semi-Supervised Generative Adversarial Learning Approach With Contrastive Learning. Search on Bibsonomy IEEE Access The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Iram Bibi, Adnan Akhunzada, Neeraj Kumar 0001 Deep AI-Powered Cyber Threat Analysis in IIoT. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Tim Ackermann, Markus Karch, Jörg Kippe Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks. Search on Bibsonomy Autom. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Tarek Moulahi, Rateb Jabbar, Abdulatif Alabdulatif, Sidra Abbas, Salim El Khediri, Salah Zidi, Muhammad Rizwan 0005 Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security. Search on Bibsonomy Expert Syst. J. Knowl. Eng. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Divya Ramachandran, Mubarak Albathan, Ayyaz Hussain, Qaisar Abbas Enhancing Cloud-Based Security: A Novel Approach for Efficient Cyber-Threat Detection Using GSCSO-IHNN Model. Search on Bibsonomy Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Amir Namavar Jahromi, Hadis Karimipour, Ali Dehghantanha An ensemble deep federated learning cyber-threat hunting model for Industrial Internet of Things. Search on Bibsonomy Comput. Commun. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Zong-Xun Li, Yu-Jun Li, Yi-Wei Liu, Cheng Liu, Nan-Xin Zhou K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph. Search on Bibsonomy Symmetry The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Prabhat Kumar 0003, Govind P. Gupta, Rakesh Tripathi, Sahil Garg, Mohammad Mehedi Hassan DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems. Search on Bibsonomy IEEE Trans. Intell. Transp. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Abbas Yazdinejad, Mostafa Kazemi, Reza M. Parizi, Ali Dehghantanha, Hadis Karimipour An ensemble deep learning model for cyber threat hunting in industrial internet of things. Search on Bibsonomy Digit. Commun. Networks The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Pankaj Kumar, Mohammad Wazid, Devesh Pratap Singh, Jaskaran Singh, Ashok Kumar Das, Youngho Park 0005, Joel J. P. C. Rodrigues Explainable artificial intelligence envisioned security mechanism for cyber threat hunting. Search on Bibsonomy Secur. Priv. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Yuhuang Huang, Mang Su, Yuting Xu, Tian Liu NER in Cyber Threat Intelligence Domain Using Transformer with TSGL. Search on Bibsonomy J. Circuits Syst. Comput. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Nan Sun 0002, Ming Ding 0001, Jiaojiao Jiang, Weikang Xu, Xiaoxing Mo, Yonghang Tai, Jun Zhang 0010 Cyber Threat Intelligence Mining for Proactive Cybersecurity Defense: A Survey and New Perspectives. Search on Bibsonomy IEEE Commun. Surv. Tutorials The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Meryem Ammi Cyber Threat Hunting Case Study using MISP. Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Akinyemi Bodunde Odunola, Dauda Akinwuyi Olalere, Mistura Laide Sanni, Emmanuel Ajayi Olajubu, Ganiyu Adesola Aderounmu, Isa Ibrahim Ali Performance Evaluation of Machine Learning Models for Cyber Threat Detection and Prevention in Mobile Money Services. Search on Bibsonomy Informatica (Slovenia) The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Mohanad Sarhan, Siamak Layeghy, Nour Moustafa, Marius Portmann Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection. Search on Bibsonomy J. Netw. Syst. Manag. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Tran Duc Luong, Vuong Minh Tien, Nguyen Huu Quyen, Do Thi Thu Hien, Phan The Duy, Van-Hau Pham Fed-LSAE: Thwarting Poisoning Attacks against Federated Cyber Threat Detection System via Autoencoder-based Latent Space Inspection. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Giuseppe Siracusano, Davide Sanvito, Roberto Gonzalez, Manikantan Srinivasan, Sivakaman Kamatchi, Wataru Takahashi 0002, Masaru Kawakita, Takahiro Kakumaru, Roberto Bifulco Time for aCTIon: Automated Analysis of Cyber Threat Intelligence in the Wild. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Mérouane Debbah, Thierry Lestable Revolutionizing Cyber Threat Detection with Large Language Models. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Herbert Maosa, Karim Ouazzane, Mohamed Chahine Ghanem A Hierarchical Security Events Correlation Model for Real-time Cyber Threat Detection and Response. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Mohamed Amine Ferrag, Djallel Hamouda, Mérouane Debbah, Leandros A. Maglaras, Abderrahmane Lakas Generative Adversarial Networks-Driven Cyber Threat Intelligence Detection Framework for Securing Internet of Things. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Mohamed Amine Ferrag, Mérouane Debbah, Muna Al-Hawawreh Generative AI for Cyber Threat-Hunting in 6G-enabled IoT Networks. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Marco Arazzi, Dincy R. Arikkat, Serena Nicolazzo, Antonino Nocera, Rafidha Rehiman K. A., P. Vinod 0001, Mauro Conti NLP-Based Techniques for Cyber Threat Intelligence. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Alexandros Papanikolaou, Aggelos Alevizopoulos, Christos Ilioudis, Konstantinos Demertzis, Konstantinos Rantos A Cyber Threat Intelligence Management Platform for Industrial Environments. Search on Bibsonomy CoRR The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Taofeek Mobolarinwa Balogun, Hayretdin Bahsi, Omer F. Keskin, Unal Tatar A comparative framework for cyber threat modelling: case of healthcare and industrial control systems. Search on Bibsonomy Int. J. Crit. Infrastructures The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17 Retraction Note: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17 Retraction Note: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17 Artificial intelligence assisted cyber threat assessment and applications for the tourism industry. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17 Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation. Search on Bibsonomy J. Comput. Virol. Hacking Tech. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17James Kotsias, Atif Ahmad, Rens Scheepers Adopting and integrating cyber-threat intelligence in a commercial organisation. Search on Bibsonomy Eur. J. Inf. Syst. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
17Markus Bayer, Tobias Frey, Christian Reuter 0001 Multi-level fine-tuning, data augmentation, and few-shot learning for specialized cyber threat intelligence. Search on Bibsonomy Comput. Secur. The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 497 (100 per page; Change: )
Pages: [1][2][3][4][5][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license