NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

[HTML][HTML] An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning

A Venčkauskas, J Toldinas, N Morkevičius, F Sanfilippo - Electronics, 2024 - mdpi.com
Email is an excellent technique for connecting users at low cost. Spam emails pose the risk
of collecting a user's personal information by fooling them into clicking on a link or engaging …

[HTML][HTML] Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing

A Venčkauskas, V Jusas, D Barisas, B Misnevs - Applied Sciences, 2024 - mdpi.com
Sharing cyber threat intelligence (CTI) can significantly improve the security of information
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …

[PDF][PDF] Cyber Risks: Systematic Literature Analysis

A BAHMANOVA, N LACE - Journal of Systemics, Cybernetics and …, 2024 - iiisci.org
This systematic literature review focuses on the digitalization theme and its associated risks,
particularly cyber risks. Conducted through a comprehensive exploration of the Scopus …

From cyber security to cyber resilience: safeguarding against evolving risks in the digital landscape

A Bahmanova, N Lace - 2024 - etalpykla.vilniustech.lt
This literature review examines the evolving discourse on digitalization's risks, particularly in
cyberspace, and advocates for a transition from cyber security to cyber resilience. Initially …

[PDF][PDF] Exploring fintech innovations and their potential to transform the future of financial services and banking

TO Sanyaolu, AG Adeleke, CF Azubuko, OS Osundare - 2024 - researchgate.net
This paper reviews the transformative potential of fintech innovations in reshaping the future
of financial services and banking. The study critically examines how emerging technologies …

[PDF][PDF] USING SMART CONTRACTS ON THE BLOCKCHAIN TO INCREASE WEBRTC SECURITY

AS YAHYA, RJ EASA - minarjournal.com
One of the most widely used technologies for peer-to-peer real-time data transmission is
WebRTC (Web Real-Time Communication). Both in the military and in civilian life, WebRTC …