Cyber Threat Intelligence Model: An Evaluation of Taxonomies and Sharing Platforms

HJ Hadi, MA Riaz, Z Abbas… - Big Data Analytics and …, 2023 - taylorfrancis.com
To defend assets, data, and information against state-of-the-art and increasing number of
cyber threats, cyber defenders should be one step ahead of these cybercriminals. This …

Development of a semantic-enabled cybersecurity threat intelligence sharing model

JS Mtsweni, NA Shozi, K Matenche, M Mutemwa… - 2016 - researchspace.csir.co.za
Big Data is transforming the global technological landscape by elevating online information
access required for addressing everyday challenges, such as detecting in real-time the …

Enhancing Cyber Threat Intelligence Through Supervised Machine Learning: A Comprehensive Classification Approach

J Bennaceur, W Zouaghi… - 2023 IEEE International …, 2023 - ieeexplore.ieee.org
The primary goal of cyber threat intelligence (CTI) is to give advanced and deep knowledge
about threat landscape in order to maintain internal and external safeguards against …

Synergizing Cyber Threat Intelligence Sharing and Risk Assessment for Enhanced Government Cybersecurity: A Holistic Approach

MD RASEL, MA Salam, RB Shovon - Journal Environmental Sciences …, 2024 - jest.com.pk
In today's interconnected digital landscape, government cybersecurity faces ever-evolving
threats. To fortify defenses, this paper advocates for a holistic approach that intertwines …

Data-driven intelligence can revolutionize today's cybersecurity world: A position paper

IH Sarker, H Janicke, L Maglaras… - … Conference on Advanced …, 2023 - Springer
As cyber threats evolve and grow progressively more sophisticated, cyber security is
becoming a more significant concern in today's digital era. Traditional security measures …

[PDF][PDF] Threat intelligence sharing: a survey

M Lutf - Journal of Applied Science and Computations, 2018 - researchgate.net
Organizations routinely struggle to understand which cyber threats pose the greatest risk to
them. The general awareness of the existing threats will help them to formulate a defense …

Cyber Threat Intelligence “Comparative Analysis of Its Sources and Parameters of Evaluation”

GK Singh, B Arora - Innovations in Computer Science and Engineering …, 2022 - Springer
Cyber threat intelligence plays a significant role in defending against the ever increasingly
frequent, varied and sophisticated cyber-attacks. Threat intelligence is information about the …

Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing

MA Nainna, JM Bass, L Speakman - European, Mediterranean, and …, 2023 - Springer
The increasing frequency of cyberattacks by criminal and state-sponsored actors, has
elevated the importance of cyber threat intelligence for organisations. We are interested to …

[PDF][PDF] Enhancing Cloud Security: A Comprehensive Framework for Real-Time Detection Analysis and Cyber Threat Intelligence Sharing

F Rehman, S Hashmi - Advances in Science, Technology and …, 2023 - researchgate.net
Cloud computing has emerged as a pivotal component of contemporary IT systems,
affording organizations the agility and scalability required to meet the ever-changing …

Enhancing cloud security—proactive threat monitoring and detection using a siem-based approach

E Tuyishime, TC Balan, PA Cotfas, DT Cotfas… - Applied Sciences, 2023 - mdpi.com
With the escalating frequency of cybersecurity threats in public cloud computing
environments, there is a pressing need for robust security measures to safeguard sensitive …