[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
techniques and indicators to perform cyber crime detection by means of more complex machine-
and deep-learning investigations as well as similar threat intelligence … such techniques. …

Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research

H Arif, A Kumar, M Fahad… - International Journal of …, 2024 - jurnal.itscience.org
… giving a thorough rundown of cloud security as it stands today … dynamic threat intelligence
feeds into threat detection systems … , techniques, and strategies that could help improve cloud

[HTML][HTML] A cloud-edge based data security architecture for sharing and analysing cyber threat information

DW Chadwick, W Fan, G Costantino… - … computer systems, 2020 - Elsevier
… valuable cyber threat intelligence that informs the user about threats to their systems. Whilst
… Some basic methods of sharing CTI include public publishing of security alerts (like US-…

P2tif: A blockchain and deep learning framework for privacy-preserved threat intelligence in industrial iot

P Kumar, R Kumar, GP Gupta, R Tripathi… - IEEE transactions on …, 2022 - ieeexplore.ieee.org
threat intelligence framework (P2TIF) to protect confidential information and to identify
cyber-threats … (TI) is an emerging proactive defense technique that can learn and build knowledge …

Artificial intelligence advantages in cloud Fintech application security

AR Kunduru - Central asian journal of …, 2023 - cajmtcs.centralasianstudies.org
… measures through innovative anomaly detection techniques. This strategic … threat intelligence
underscores the transformative potential of technology in fortifying the security of cloud-…

Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
cyber threat intelligence. The motivation for this research stems from the recent emergence
of sharing cyber threat intelligence and … and cyber threat intelligence sharing communities. …

Enabling efficient cyber threat hunting with cyber threat intelligence

P Gao, F Shao, X Liu, X Xiao, Z Qin, F Xu… - 2021 IEEE 37th …, 2021 - ieeexplore.ieee.org
… rich external threat knowledge provided by open-source Cyber Threat Intelligence (OSCTI). …
, a system that facilitates threat hunting in computer systems using OSCTI. Built upon system …

Hincti: A cyber threat intelligence modeling and identification system based on heterogeneous information network

Y Gao, X Li, H Peng, B Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
intelligence meta-schema to depict the semantic relatedness of infrastructure nodes. We then
model cyber threat intelligencecyber threat intelligence in a graph database: Methods of …

Computational intelligence intrusion detection techniques in mobile cloud computing environments: Review, taxonomy, and open research issues

S Shamshirband, M Fathi, AT Chronopoulos… - … of Information Security …, 2020 - Elsevier
… detection systems that use computational intelligence (CI) methods in a (mobile) cloud
based on virtual cloud security, discussing some IDS techniques for malware detection, and …

Cyber security threats in cloud: Literature review

R Al Nafea, MA Almaiah - 2021 international conference on …, 2021 - ieeexplore.ieee.org
… with regards to cloud system security techniques, and the mitigation techniques presented
by … [16] Performed a detailed review of cloud security issues, threats and attacks. With more …