Cyber threat intelligence exchange: A growing requirement

N Veerasamy - 2017 - researchspace.csir.co.za
Managing the rise of cyber-attacks has become a growing challenge. Cyber space has
become a battleground of threats ranging from malware to phishing, spam and password …

Challenges and opportunities of blockchain for cyber threat intelligence sharing

K Dunnett, S Pal, Z Jadidi - Secure and Trusted Cyber Physical Systems …, 2022 - Springer
The emergence of the Internet of Things (IoT) technology has caused a powerful transition in
the cyber threat landscape. As a result, organisations have had to find new ways to better …

[PDF][PDF] AI-Infused Threat Detection and Incident Response in Cloud Security

S Tatineni - International Journal of Science and Research (IJSR), 2023 - academia.edu
With the evolving sophisticated attack techniques and cyber-attacks, businesses must adapt
their threat detection and response mechanisms. It is paramount to explorecontemporary …

Cyber security Vulnerabilities and Remediation Through Cloud Security Tools

FNU Jimmy - Journal of Artificial Intelligence General science …, 2024 - ojs.boulibrary.com
The proliferation of internet usage has surged dramatically, prompting individuals and
businesses to conduct myriad transactions online rather than in physical spaces. The onset …

[PDF][PDF] Artificial Intelligence in Cybersecurity: A Focus on Hybrid Cloud Environments

L Whitelegge - researchgate.net
The integration of Artificial Intelligence (AI) into cybersecurity systems has transformed how
organizations detect, prevent, and respond to cyber threats. As more businesses adopt …

Context-aware cyber threat intelligence exchange platform

M Motlhabi, P Pantsi, B Mangoale… - … on Cyber Warfare …, 2022 - books.google.com
The ubiquity of network and internet-connected devices has increased exponentially in the
past decade. The proliferation of end-user devices has created a lucrative environment for …

[HTML][HTML] Priv-Share: A privacy-preserving framework for differential and trustless delegation of cyber threat intelligence using blockchain

K Dunnett, S Pal, Z Jadidi, V Dedeoglu, R Jurdak - Computer Networks, 2024 - Elsevier
The emergence of the Internet of Things (IoT), Industry 5.0 applications and associated
services have caused a powerful transition in the cyber threat landscape. As a result …

[PDF][PDF] Big Data Security Tools and Management Practices for Cloud Environment

A CHIRANJEEVI, DRP PEDDI, DRS PAPPALA - ijarasem.com
The IT industry has recently grown enamoured with concepts of" cloud computing"(the use of
the Internet to store and manage vast amounts of data) and" Big data"(the challenges of …

[PDF][PDF] Cloud security: Bridging the gap between cloud engineering and cybersecurity

SR Gudimetla, NR Kotha - Webology (ISSN: 1735-188X), 2018 - researchgate.net
The increasing reliance on cloud computing for essential services has elevated the
importance of robust cloud security, necessitating a seamless integration of cloud …

[PDF][PDF] Proactive Defense: Remediation Approaches to Cloud Cybersecurity Risks

T Bolu - 2024 - researchgate.net
In today's cloud-centric landscape, a proactive defense strategy is essential to safeguard
against ever-evolving cybersecurity risks. This paper focuses on remediation approaches to …