[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Actionable cyber threat intelligence for automated incident response

C Leite, J den Hartog, D Ricardo dos Santos… - Nordic Conference on …, 2022 - Springer
Abstract Applying Cyber Threat Intelligence for active cyber defence, while potentially very
beneficial, is currently limited to predominantly manual use. In this paper, we propose an …

An Exploratory Study on the Use of Threat Intelligence Sharing Platforms in Germany, Austria and Switzerland

D Fischer, C Sauerwein, M Werchan… - Proceedings of the 18th …, 2023 - dl.acm.org
Threat intelligence sharing is a promising solution to enhance knowledge and situational
awareness of the rapidly growing number of emerging cyber threats. Accordingly, there are …

SeCTIS: A Framework to Secure CTI Sharing

DR Arikkat, M Cihangiroglu, M Conti… - arXiv preprint arXiv …, 2024 - arxiv.org
The rise of IT-dependent operations in modern organizations has heightened their
vulnerability to cyberattacks. As a growing number of organizations include smart …

InfoSec. pptx: A Longitudinal Study of Speakers, Topics, and Sponsors at Security Conferences in Academia and Industry

L Walter, C Sauerwein, DW Woods - arXiv preprint arXiv:2404.17989, 2024 - arxiv.org
Security conferences are important venues at which academics and practitioners share
knowledge about new attacks and state-of-the-art defenses. Despite this, researchers have …

FeedRef2022: A Named Entity Recognition Dataset for Extracting Indicators of Compromise

HJ Chan, CY Hsu, CC Chien, JJ Wu… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
With the increasing use of the internet, cyber threats and malicious activities are becoming
ubiquitous. To avoid unsuspecting attacks, gathering enough information about different …

Methodology to Improve the Quality of Cyber Threat Intelligence Production Through Open Source Platforms

R Machado da Silva, JJ Costa Gondim… - … on Computer Science …, 2022 - Springer
In cyberspace, boundaries are constantly being crossed in the name of progress and
convenience, and invariably result in new vulnerabilities and potential attacks. Traditional …

Defining Metrics for Comparing Threat Intelligence Solutions Through the Lens of the Analyst

A Plaza, T Hayajneh - 2023 IEEE 14th Annual Ubiquitous …, 2023 - ieeexplore.ieee.org
Threat intelligence can be a valuable tool for any cybersecurity team. However, paid
solutions are often costly. Furthermore, it is difficult to determine what solution is suitable for …

Automated Cyber Threat Intelligence Generation on Multi-Host Network Incidents

C Leite, J Den Hartog, DR Dos Santos… - … Conference on Big …, 2023 - ieeexplore.ieee.org
The lack of automation is one of the main issues hindering the broad usage of high-level
Cyber Threat Intelligence (CTI). Creating and using such information by capturing Tactics …