A programmable threat intelligence framework for containerized clouds

Ç Yücel, A Koltuksuz, M Ödemiş… - … on Cyber Warfare …, 2018 - search.proquest.com
Contemporarily, one of the main challenges for information security community is the
growing number of cyber threats. Large scaled, globally orchestrated and constantly …

[PDF][PDF] Cyber Threat Intelligence Information Sharing

E Arenas - School of Engineering and Technology CQUniversity … - researchgate.net
Today, the socio-political and technological transformation of mankind is being challenged
by a series of sophisticated cybersecurity threats and technology-enabled crimes …

Future Horizons: AI-Enhanced Threat Detection in Cloud Environments: Unveiling Opportunities for Research

H Arif, A Kumar, M Fahad… - International Journal of …, 2024 - jurnal.itscience.org
In this extensive and comprehensive review paper, we delve into the dynamic landscape of
artificial intelligence (AI)-enhanced threat detection within cloud environments. The …

Cyber Security-Informationsaustausch zur Erkennung von Cyber-Bedrohungen und-Vorfällen

F Fransen, A Smulders, R Kerkdijk - e & i Elektrotechnik und …, 2015 - Springer
The last couple of years we have seen an increase in interests and initiatives in establishing
threat intelligence sharing communities, and on the development of standards and platforms …

A distributed ledger for non-attributable cyber threat intelligence exchange

P Huff, Q Li - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over
adversaries by more quickly characterizing the threat, understanding its tactics, anticipating …

Risk assessment of sharing cyber threat intelligence

A Albakri, E Boiten, R Smith - … DeSECSys, MPS, and SPOSE, Guildford, UK …, 2020 - Springer
Abstract Sharing Cyber Threat Intelligence (CTI) is advocated to get better defence against
new sophisticated cyber-attacks. CTI may contain critical information about the victim …

Tactics, Techniques and Procedures (TTPs) to Augment Cyber Threat Intelligence (CTI): A Comprehensive Study

MAH Shahi - 2018 - repository.stcloudstate.edu
Abstract Sharing Threat Intelligence is now one of the biggest trends in cyber security
industry. Today, no one can deny the necessity for information sharing to fight the cyber …

An Artificial Intelligence Assisted Defensive Framework for Securing Cyberspace

K Kaushik, S Dahiya - … on Computational Intelligence, Data Science and …, 2022 - Springer
Since the computer industry has started, the Internet has reached every organization and
individual. Everyone is sharing or using some data in this digital world through various …

Relevance filtering for shared cyber threat intelligence (short paper)

TD Wagner, E Palomar, K Mahbub… - … Security Practice and …, 2017 - Springer
Cyber threat intelligence sharing is an imperative process to survive current and future
attacks. The received information may protect stakeholders from being attacked by utilizing …

Blockchain and explainable AI for enhanced decision making in cyber threat detection

P Kumar, D Javeed, R Kumar… - Software: Practice and …, 2024 - Wiley Online Library
Artificial Intelligence (AI) based cyber threat detection tools are widely used to process and
analyze a large amount of data for improved intrusion detection performance. However …