Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3162588
Abstract: We investigated 12 years DNS query logs of our campus network and identified phenomena of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are difficult to detect using cyber threat intelligence (CTI) systems based…
read more here.
Keywords:
cti;
intelligence;
xai osint;
cyber threat ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3176965
Abstract: The dark web has been confronted with a significant increase in the number and variety of onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical complexity of the Tor network are key…
read more here.
Keywords:
onion services;
classification;
threat intelligence;
cyber threat ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3181278
Abstract: Ransomware is one of the most harmful types of cyber attacks that cause major concerns on a global scale. It makes the victims’ resources unusable by encrypting data or locking systems to extort ransom payments.…
read more here.
Keywords:
threat hunting;
cyber threat;
ransomware attacks;
ransomware ... See more keywords
Sign Up to like & get
recommendations!
3
Published in 2023 at "IEEE Internet of Things Journal"
DOI: 10.1109/jiot.2022.3229722
Abstract: Distributed Industrial Internet of Things (IIoT) has entirely revolutionized the industrial sector that varies from autonomous industrial processes to automation of processes without human intervention. However, threat hunting and intelligence is the most complex task…
read more here.
Keywords:
iiot;
threat;
cyber threat;
threat analysis ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Transactions on Intelligent Transportation Systems"
DOI: 10.1109/tits.2021.3122368
Abstract: The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the smart maritime objects, infrastructure associated with ship or port communicate wirelessly…
read more here.
Keywords:
intelligence;
threat;
iot enabled;
transportation systems ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2020 at "Applied Sciences"
DOI: 10.3390/app10124334
Abstract: The increasing degree of connectivity in factory of the future (FoF) environments, with systems that were never designed for a networked environment in terms of their technical security nature, is accompanied by a number of…
read more here.
Keywords:
fof environments;
threat actors;
factory future;
actors factory ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2022 at "Data"
DOI: 10.3390/data7040049
Abstract: This study examines the phenomenon of disinformation as a threat in the realm of cybersecurity. We have analyzed multiple authoritative cybersecurity standards, manuals, handbooks, and literary works. We present the unanimous meaning and construct of…
read more here.
Keywords:
disinformation;
cyber threat;
cybersecurity;
cyber ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15020337
Abstract: Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present.…
read more here.
Keywords:
threat intelligence;
threat;
cyber threat;
knowledge ... See more keywords