Articles with "threat intelligence" as a keyword



Photo by possessedphotography from unsplash

Leveraging cyber threat intelligence for a dynamic risk framework

Sign Up to like & get
recommendations!
Published in 2019 at "International Journal of Information Security"

DOI: 10.1007/s10207-019-00433-2

Abstract: One of the most important goals in an organization is to have risks under an acceptance level along the time. All organizations are exposed to real-time security threats that could have an impact on their… read more here.

Keywords: threat intelligence; risk; threat; dynamic risk ... See more keywords
Photo by possessedphotography from unsplash

Network attack prediction method based on threat intelligence for IoT

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-7005-2

Abstract: The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior… read more here.

Keywords: threat intelligence; malicious behavior; method; threat ... See more keywords
Photo from wikipedia

A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2844794

Abstract: Industry 4.0 represents the fourth phase of industry and manufacturing revolution, unique in that it provides Internet-connected smart systems, including automated factories, organizations, development on demand, and ‘just-in-time’ development. Industry 4.0 includes the integration of… read more here.

Keywords: scheme; threat intelligence; industry; network ... See more keywords
Photo from wikipedia

Multimodal Classification of Onion Services for Proactive Cyber Threat Intelligence using Explainable Deep Learning

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3176965

Abstract: The dark web has been confronted with a significant increase in the number and variety of onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical complexity of the Tor network are key… read more here.

Keywords: onion services; classification; threat intelligence; cyber threat ... See more keywords
Photo by possessedphotography from unsplash

A Novel Threat Intelligence Detection Model Using Neural Networks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3229495

Abstract: A network intrusion detection system (IDS) is commonly recognized as an effective solution for identifying threats and malicious attacks. Due to the rapid emergence of threats and new attack vectors, novel and adaptive approaches must… read more here.

Keywords: intelligence detection; threat intelligence; detection; model ... See more keywords
Photo by whoishaleylawrence from unsplash

Guest Editorial: AI-Enabled Threat Intelligence and Hunting Microservices for Distributed Industrial IoT System

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2021.3111028

Abstract: Industrial Internet of Things (IIoT) systems are increasingly found in settings such as factories, smart cities/nations, and healthcare institutions. These systems facilitate the interconnection of automation and data analytics across different industrial technologies, such as… read more here.

Keywords: system; guest editorial; editorial enabled; threat intelligence ... See more keywords
Photo by possessedphotography from unsplash

K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph

Sign Up to like & get
recommendations!
Published in 2023 at "Symmetry"

DOI: 10.3390/sym15020337

Abstract: Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present.… read more here.

Keywords: threat intelligence; threat; cyber threat; knowledge ... See more keywords