Zobrazeno 1 - 10
of 1 813
pro vyhledávání: '"cyber threat"'
Publikováno v:
Complex & Intelligent Systems, Vol 11, Iss 1, Pp 1-14 (2024)
Abstract In the research of cyber threat intelligence knowledge graphs, the current challenge is that there are errors, inconsistencies, or missing knowledge graph triples, which makes it difficult to cope with the complexity and diversified applicat
Externí odkaz:
https://doaj.org/article/9b91b68960cb4d9aa82d19747c7a066c
Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
Autor:
Charalampos Bratsas, Efstathios Konstantinos Anastasiadis, Alexandros K. Angelidis, Lazaros Ioannidis, Rigas Kotsakis, Stefanos Ougiaroglou
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 3, Pp 518-545 (2024)
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making. However, because the d
Externí odkaz:
https://doaj.org/article/7870dfff40b541d98c8d85ca2e047ba8
Autor:
Ehtsham Irshad, Abdul Basit Siddiqui
Publikováno v:
ICT Express, Vol 10, Iss 3, Pp 553-569 (2024)
With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and proced
Externí odkaz:
https://doaj.org/article/920c53708bc144e6a315bf82ca7398de
Publikováno v:
IEEE Access, Vol 12, Pp 1217-1234 (2024)
MITRE ATT&CK is a comprehensive knowledge-base of adversary tactics, techniques, and procedures (TTP) based on real-world attack scenarios. It has been used in different sectors, such as government, academia, and industry, as a foundation for threat
Externí odkaz:
https://doaj.org/article/8f8556da6702483099b6c7bb5374dac6
Publikováno v:
Journal of Cybersecurity and Privacy, Vol 4, Iss 2, Pp 357-381 (2024)
Emerging cyber threats’ sophistication, impact, and complexity rapidly evolve, confronting organizations with demanding challenges. This severe escalation requires a deeper understanding of adversary dynamics to develop enhanced defensive strategie
Externí odkaz:
https://doaj.org/article/2ffed088af244826b244b92054f623c7
Publikováno v:
AIMS Mathematics, Vol 9, Iss 7, Pp 17676-17695 (2024)
The fast development of the internet of things has been associated with the complex worldwide problem of protecting interconnected devices and networks. The protection of cyber security is becoming increasingly complicated due to the enormous growth
Externí odkaz:
https://doaj.org/article/70ff11a1d438471ba0570f1e62c30cef
Publikováno v:
IET Renewable Power Generation, Vol 18, Iss 7, Pp 1370-1379 (2024)
Abstract Developing accurate wind speed forecasting methods is indispensable to integrating wind energy into smart grids. However, current state‐of‐the‐art wind speed forecasting methods are almost data‐driven deep learning models, which may
Externí odkaz:
https://doaj.org/article/4cfd5a6eeca04a369d740b9428de5554
Publikováno v:
Sensors International, Vol 6, Iss , Pp 100297- (2025)
The Industrial Internet of Things (IIoT) is undergoing rapid development, and as a result, security threats have emerged as a significant concern. IIoT networks, while enhancing service quality, are particularly susceptible to security risks because
Externí odkaz:
https://doaj.org/article/bdad32948d984727a546c8c02d810fda
Autor:
Rodman, David1 djrodman@optimum.net
Publikováno v:
Israel Affairs. Dec2023, Vol. 29 Issue 6, p1248-1250. 3p.
Publikováno v:
ABUAD Journal of Engineering Research and Development, Vol 7, Iss 2 (2024)
The rapid increase in the adoption of 5G networks has revolutionized communication technologies, enabling high-speed data transmission and connectivity across various domains. However, the advent of 5G technology comes with an increased risk of cyber
Externí odkaz:
https://doaj.org/article/a862f81efe394fac95ac2e273bdc47c7