[PDF][PDF] Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection Analysis and Cyber Threat Intelligence Sharing

F Rehman, S Hashmi - … , Technology and Engineering Systems …, 2023 - researchgate.net
… Conventional methods employed for securing cloud infrastruc… tion systems (IDS/IPS), cloud
access and security brokers (… sophisticated techniques deployed by attackers targeting cloud

AI-POWERED THREAT INTELLIGENCE FOR PROACTIVE SECURITY MONITORING IN CLOUD INFRASTRUCTURES

TC Kanth - 2024 - philpapers.org
… Conventional security methods can become … new threats, is an effective tool for improving
cloud security. AI, by employing machine learning algorithms, anomaly detection techniques, …

[PDF][PDF] The Impact of Cloud Computing on Cybersecurity Threat Hunting and Threat Intelligence Sharing: Data Security, Data Sharing, and Collaboration

N Mohammad - International Journal of Computer Applications …, 2022 - researchgate.net
… of innovative techniques for threat hunting and incident response in cloudcloud threat
intelligence, explores its various sources, and highlights its importance in bolstering cloud security

[图书][B] Cyber threat intelligence: challenges and opportunities

M Conti, T Dargahi, A Dehghantanha - 2018 - Springer
techniques to collect, analyse, and interpret cyber attack evidences. In this introductory
chapter we first discuss the notion of cyber threat intelligence … on the cyber attack methods and …

[HTML][HTML] Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence

H Al-Mohannadi, I Awan, J Al Hamar - Service Oriented Computing and …, 2020 - Springer
threat intelligence approach to understand the attack pattern and behaviour of an adversary.
The threat intelligence technique … have deployed cloud honeypots as services to find cyber-…

[HTML][HTML] Cyber threat intelligence framework for incident response in an energy cloud platform

S Gong, C Lee - Electronics, 2021 - mdpi.com
… a cyber threat intelligence generation technique targeting the energy … cloud security framework
based on cyber threat intelligence to improve the security capabilities of the energy cloud

[PDF][PDF] Cyber security threat intelligence using data mining techniques and artificial intelligence

S Gupta, AS Sabitha, R Punhani - Int. J. Recent Technol. Eng, 2019 - academia.edu
… The objective of this literature review on cybersecurity threat intelligence is as follows: 1) To
… includes statistical techniques to test threat intelligence based on data mining techniques. …

[PDF][PDF] Network Security Situation Awareness Framework based on Threat Intelligence.

H Zhang, Y Yi, J Wang, N Cao… - Computers, Materials & …, 2018 - researchgate.net
… network security situation of the cloud environment based on the game process of both attack
and defense. In attack prediction, cyber threat intelligencemethods in these two situations. …

What is cyber threat intelligence and how is it evolving?

W Tounsi - … and Digital Trust: Cyber Security in the Era of Cloud …, 2019 - Wiley Online Library
threat intelligence and how literature subdivides it given its multiple sources, the gathering
methods… identified the following 12 critical issues in cloud security, ranked in order of severity …

A new threat intelligence scheme for safeguarding industry 4.0 systems

N Moustafa, E Adi, B Turnbull, J Hu - IEEE Access, 2018 - ieeexplore.ieee.org
… We propose a threat intelligence technique for recognising cyber threats in Industry 4.0 …
KR Choo, “On cloud security attacks: A taxonomy and intrusion detection and prevention as …