In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …
X Ma, D Yu, Y Du, L Li, W Ni, H Lv - Electronics, 2023 - mdpi.com
With the development of the Internet, cyberattacks are becoming increasingly complex, sustained, and organized. Cyber threat intelligence sharing is one of the effective ways to …
This paper discusses the design and implementation of Autonomous Cyber Defense (ACD) agents for Protected Core Networking (PCN). Our solution includes two types of specialized …
D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding organizations against cyber threats. However, managing, storing, analyzing, and sharing …
A network intrusion detection system (IDS) is commonly recognized as an effective solution for identifying threats and malicious attacks. Due to the rapid emergence of threats and new …
The Covid-19 pandemic has impacted the world economy, and Malaysia is no exception. Due to the closure of businesses, the rate of unemployment has been recorded at an all-time …
RK Deshmukh, M Shrivastav - South Eastern European Journal of …, 2024 - seejph.com
India and other Asian nations are seeing an unparalleled pace of advancement in the modernisation of their healthcare systems. In this endeavour, information technology is …
OEO Eltayeb - Journal of Ecohumanism, 2024 - ecohumanism.co.uk
Research objective: This study evaluates the efficiency of cyber threat intelligence (CTI) for predicting and mitigating cyber threats, which is important in business today. Organisations …