Articles with "cyber threat" as a keyword



Photo by possessedphotography from unsplash

Robust Botnet DGA Detection: Blending XAI and OSINT for Cyber Threat Intelligence Sharing

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3162588

Abstract: We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are difficult to detect using cyber threat intelligence (CTI) systems based… read more here.

Keywords: cti; intelligence; xai osint; cyber threat ... See more keywords
Photo from wikipedia

Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence using Explainable Deep Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3176965

Abstract: The dark web has been confronted with a significant increase in the number and variety of onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical complexity of the Tor network are key… read more here.

Keywords: onion services; classification; threat intelligence; cyber threat ... See more keywords
Photo by sebastianpoc from unsplash

Utilizing Cyber Threat Hunting Techniques to Find Ransomware Attacks: A Survey of the State of the Art

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3181278

Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.… read more here.

Keywords: threat hunting; cyber threat; ransomware attacks; ransomware ... See more keywords
Photo by possessedphotography from unsplash

Deep AI-Powered Cyber Threat Analysis in IIoT

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2022.3229722

Abstract: Distributed Industrial Internet of Things (IIoT) has entirely revolutionized the industrial sector that varies from autonomous industrial processes to automation of processes without human intervention. However, threat hunting and intelligence is the most complex task… read more here.

Keywords: iiot; threat; cyber threat; threat analysis ... See more keywords

DLTIF: Deep Learning-Driven Cyber Threat Intelligence Modeling and Identification Framework in IoT-Enabled Maritime Transportation Systems

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"

DOI: 10.1109/tits.2021.3122368

Abstract: The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly… read more here.

Keywords: intelligence; threat; iot enabled; transportation systems ... See more keywords
Photo from academic.microsoft.com

Cyber Threat Actors for the Factory of the Future

Sign Up to like & get
recommendations!
Published in 2020 at "Applied Sciences"

DOI: 10.3390/app10124334

Abstract: The increasing degree of connectivity in factory of the future (FoF) environments, with systems that were never designed for a networked environment in terms of their technical security nature, is accompanied by a number of… read more here.

Keywords: fof environments; threat actors; factory future; actors factory ... See more keywords
Photo from wikipedia

The Missing Case of Disinformation from the Cybersecurity Risk Continuum: A Comparative Assessment of Disinformation with Other Cyber Threats

Sign Up to like & get
recommendations!
Published in 2022 at "Data"

DOI: 10.3390/data7040049

Abstract: This study examines the phenomenon of disinformation as a threat in the realm of cybersecurity. We have analyzed multiple authoritative cybersecurity standards, manuals, handbooks, and literary works. We present the unanimous meaning and construct of… read more here.

Keywords: disinformation; cyber threat; cybersecurity; cyber ... See more keywords
Photo by possessedphotography from unsplash

K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph

Sign Up to like & get
recommendations!
Published in 2023 at "Symmetry"

DOI: 10.3390/sym15020337

Abstract: Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present.… read more here.

Keywords: threat intelligence; threat; cyber threat; knowledge ... See more keywords