[HTML][HTML] Intelligent process automation and business continuity: Areas for future research

J Brás, R Pereira, S Moro - Information, 2023 - mdpi.com
Robotic process automation and intelligent process automation have gained a foothold in
the automation of business processes, using blocks of software (bots). These agents interact …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Overcoming information-sharing challenges in cyber defence exercises

A Brilingaitė, L Bukauskas… - Journal of …, 2022 - academic.oup.com
Active usage of threat intelligence information supports effective prevention, mitigation and
defence against cyberattacks by threat actors ranging from individual amateurs to state …

[PDF][PDF] Do you play it by the books? A study on incident response playbooks and influencing factors

D Schlette, P Empl, M Caselli, T Schreck… - 2024 IEEE Symposium …, 2023 - researchgate.net
Incident response “playbooks” are structured sets of operational procedures organizations
use to instruct humans or machines on performing countermeasures against cybersecurity …

Understanding How National CSIRTs Evaluate Cyber Incident Response Tools and Data: Findings from Focus Group Discussions

SRB Mohd Kassim, S Li, B Arief - Digital Threats: Research and Practice, 2023 - dl.acm.org
National Computer Security Incident Response Teams (CSIRTs) have been established
worldwide to coordinate responses to computer security incidents at the national level. While …

Efficient collective action for tackling time-critical cybersecurity threats

S Gillard, D Percia David, A Mermoud… - Journal of …, 2023 - academic.oup.com
The latency reduction between the discovery of vulnerabilities, the build-up, and the
dissemination of cyberattacks has put significant pressure on cybersecurity professionals …

Towards an Improved Taxonomy of Attacks Related to Digital Identities and Identity Management Systems

D Pöhn, W Hommel - Security and Communication Networks, 2023 - Wiley Online Library
Digital transformation with the adoption of cloud technologies, outsourcing, and working‐
from‐home possibilities permits flexibility for organizations and persons. At the same time, it …

[HTML][HTML] Building collaborative cybersecurity for critical infrastructure protection: Empirical evidence of collective intelligence information sharing dynamics on threatfox

E Jollès, S Gillard, D Percia David… - … Conference on Critical …, 2022 - Springer
This article describes three collective intelligence dynamics observed on ThreatFox, a free
platform operated by abuse. ch that collects and shares indicators of compromise. These …

[HTML][HTML] Enhancing Cyber-Threat Intelligence in the Arab World: Leveraging IoC and MISP Integration

IY Alzahrani, S Lee, K Kim - Electronics, 2024 - mdpi.com
Cybercrime threat intelligence enables proactive measures against threat actors and
informed, data-driven security decisions. This study proposes a practical implementation of …

Methodology to Improve the Quality of Cyber Threat Intelligence Production Through Open Source Platforms

R Machado da Silva, JJ Costa Gondim… - … on Computer Science …, 2022 - Springer
In cyberspace, boundaries are constantly being crossed in the name of progress and
convenience, and invariably result in new vulnerabilities and potential attacks. Traditional …