NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Lightweight Cryptanalysis of IoT Encryption Algorithms: Is Quota Sampling the Answer?

J Cook, MA Khan - arXiv preprint arXiv:2404.08165, 2024 - arxiv.org
Rapid growth in the number of small sensor devices known as the Internet of Things (IoT)
has seen the development of lightweight encryption algorithms. Two well-known lightweight …

A data-driven and knowledge graph-based analysis of the risk hazard coupling mechanism in subway construction accidents

X Huo, Y Yin, L Jiao, Y Zhang - Reliability Engineering & System Safety, 2024 - Elsevier
With the development and expansion of subway construction, accidents usually cause
economic losses and seriously threaten personnel safety. Exploring the experience and …

Research on quality assessment methods for cybersecurity knowledge graphs

Z Shi, H Li, D Zhao, C Pan - Computers & Security, 2024 - Elsevier
In light of the continuous evolution of cyber threats and the escalating frequency of
cyberattacks, cybersecurity knowledge graphs have emerged as vital tools for …

Entity and Relation Extractions for Threat Intelligence Knowledge Graphs

I MOUICHE, S Saad - Available at SSRN 4878306 - papers.ssrn.com
Advanced persistent threats (APTs) represent a complex challenge in cybersecurity as they
infiltrate networks stealthily to conduct espionage, steal data, and maintain a long-term …