[PDF][PDF] The Role of Artificial Intelligence in Proactive Cyber Threat Detection In Cloud Environments

ARP Reddy - NeuroQuantology, 2021 - researchgate.net
Amidst the constantly changing landscape of digital security concerns, the role of Artificial
Intelligence (AI) in proactive cyber threat identification within cloud systems has become …

Optimizing Incident Response in Cloud Security with Ai And Big Data Integration

AK ReddyAyyadapu - Chelonian Research Foundation, 2023 - acgpublishing.com
This study investigates how to combine big data analytics and artificial intelligence (AI) to
optimize incident response in cloud security. Strong security measures are becoming …

Defensechain: Consortium blockchain for cyber threat intelligence sharing and defense

S Purohit, P Calyam, S Wang… - … 2nd Conference on …, 2020 - ieeexplore.ieee.org
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent
threats, cryptojacking which threaten service availability. Recently, methods for threat …

Data quality challenges and future research directions in threat intelligence sharing practice

C Sillaber, C Sauerwein, A Mussmann… - Proceedings of the 2016 …, 2016 - dl.acm.org
In the last couple of years, organizations have demonstrated an increased willingness to
participate in threat intelligence sharing platforms. The open exchange of information and …

[PDF][PDF] LEVERAGING AI AND CLOUD COMPUTING TO ENHANCE CYBERSECURITY AGAINST SOCIAL ENGINEERING THREATS

PS Samant - researchgate.net
The rapid advancement of technology has led to an increase in the frequency and
sophistication of social engineering attacks, which exploit human psychology to breach …

Study on Hybrid Cloud-based Cyber Threat Intelligence Sharing Model Requirements Analysis

JJ Heo, YE Gebremariam, H Park, B Kim… - Proceedings of the 2020 …, 2020 - dl.acm.org
Because of the phenomenal growth of internet connectivity and unceasing improvements
over hardware and software technology, everything is connected without any boundaries …

ThreatHawk: A Threat Intelligence Platform

A Panwar, A Nair, A Sonthalia, K Sooda… - … : Selected Papers of …, 2022 - Springer
As the world and organizations are moving toward a digital future, digital crime is also
increasing and everyday there are a multitude of cyberattacks occurring, which target our …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

What is cyber threat intelligence and how is it evolving?

W Tounsi - Cyber‐Vigilance and Digital Trust: Cyber Security in …, 2019 - Wiley Online Library
This chapter aims to give a clear idea about threat intelligence and how literature subdivides
it given its multiple sources, the gathering methods, the information life‐span and who …

[PDF][PDF] Real-time threat prediction for cloud based assets using big-data analytics

TK Thriveni, CSR Prashanth - 2015 - researchgate.net
With reports on cloud related breaches becoming a daily occurrence, enterprises are
looking for secure cloud infrastructure which can support their applications and data on …