Sign Up to like & get
recommendations!
0
Published in 2019 at "International Journal of Information Security"
DOI: 10.1007/s10207-019-00433-2
Abstract: One of the most important goals in an organization is to have risks under an acceptance level along the time. All organizations are exposed to real-time security threats that could have an impact on their…
read more here.
Keywords:
threat intelligence;
risk;
threat;
dynamic risk ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-7005-2
Abstract: The Social Internet of Things (SIoT) is a combination of the Internet of Things (IoT) and social networks, which enables better service discovery and improves the user experience. The threat posed by the malicious behavior…
read more here.
Keywords:
threat intelligence;
malicious behavior;
method;
threat ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2844794
Abstract: Industry 4.0 represents the fourth phase of industry and manufacturing revolution, unique in that it provides Internet-connected smart systems, including automated factories, organizations, development on demand, and ‘just-in-time’ development. Industry 4.0 includes the integration of…
read more here.
Keywords:
scheme;
threat intelligence;
industry;
network ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3176965
Abstract: The dark web has been confronted with a significant increase in the number and variety of onion services of illegitimate and criminal intent. Anonymity, encryption, and the technical complexity of the Tor network are key…
read more here.
Keywords:
onion services;
classification;
threat intelligence;
cyber threat ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3229495
Abstract: A network intrusion detection system (IDS) is commonly recognized as an effective solution for identifying threats and malicious attacks. Due to the rapid emergence of threats and new attack vectors, novel and adaptive approaches must…
read more here.
Keywords:
intelligence detection;
threat intelligence;
detection;
model ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Industrial Informatics"
DOI: 10.1109/tii.2021.3111028
Abstract: Industrial Internet of Things (IIoT) systems are increasingly found in settings such as factories, smart cities/nations, and healthcare institutions. These systems facilitate the interconnection of automation and data analytics across different industrial technologies, such as…
read more here.
Keywords:
system;
guest editorial;
editorial enabled;
threat intelligence ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "Symmetry"
DOI: 10.3390/sym15020337
Abstract: Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with security threats. Considering the growth of cyber threat intelligence, the quick analysis of threats has become a hot topic at present.…
read more here.
Keywords:
threat intelligence;
threat;
cyber threat;
knowledge ... See more keywords