[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

[PDF][PDF] Real-time threat prediction for cloud based assets using big-data analytics

TK Thriveni, CSR Prashanth - 2015 - researchgate.net
With reports on cloud related breaches becoming a daily occurrence, enterprises are
looking for secure cloud infrastructure which can support their applications and data on …

Threat Intelligence Sharing: Analyzing Strategies and Challenges in Sharing Threat Intelligence Among Organizations to Enhance Cybersecurity Posture and Incident …

E Carter - Cybersecurity and Network Defense Research, 2021 - thesciencebrigade.com
Threat intelligence sharing plays a crucial role in enhancing cybersecurity posture and
incident response capabilities. This paper provides an in-depth analysis of the strategies …

ThreatHawk: A Threat Intelligence Platform

A Panwar, A Nair, A Sonthalia, K Sooda… - … : Selected Papers of …, 2022 - Springer
As the world and organizations are moving toward a digital future, digital crime is also
increasing and everyday there are a multitude of cyberattacks occurring, which target our …

Building Secure Cloud Infrastructures: The Impact of AI on Cybersecurity Strategies

SV Kuster - MZ Journal of Artificial Intelligence, 2024 - mzjournal.com
The integration of artificial intelligence (AI) into cloud infrastructures is transforming
cybersecurity strategies, offering enhanced protection against increasingly sophisticated …

[引用][C] CYBER THREAT MITIGATION THROUGH AI-ENABLED BIG DATA ANALYSIS IN CLOUD ADMINISTRATION

AKR Ayyadapu - JOURNAL OF BASIC SCIENCE AND ENGINEERING, 2021

Integrating Intelligence Paradigms into Cyber Security Curriculum for Advanced Threat Mitigation

M Dawson - International Conference on Information Technology …, 2024 - Springer
As the cyber domain continues to develop, it becomes increasingly crucial to provide
cybersecurity workers with state-of-the-art competencies. This scholarly endeavor …

[PDF][PDF] Cyber security information exchange to gain insight into the effects of cyber threats and incidents.

F Fransen, A Smulders, R Kerkdijk - Elektrotech …, 2015 - researchgate.net
The last couple of years we have seen an increase in interests and initiatives in establishing
threat intelligence sharing communities, and on the development of standards and platforms …

What is cyber threat intelligence and how is it evolving?

W Tounsi - Cyber‐Vigilance and Digital Trust: Cyber Security in …, 2019 - Wiley Online Library
This chapter aims to give a clear idea about threat intelligence and how literature subdivides
it given its multiple sources, the gathering methods, the information life‐span and who …

[引用][C] Enhancing Cloud Security: A Siem Based Approach for Proactive Threat Monitoring and Detection

E Tuyishime, TC Bălan, PA Cotfas, DT Cotfas… - Available at SSRN 4434761