Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

A survey on technical threat intelligence in the age of sophisticated cyber attacks

W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …

Cybersecurity as an industry: A cyber threat intelligence perspective

S Samtani, M Abate, V Benjamin, W Li - The Palgrave Handbook of …, 2020 - Springer
The rapid integration of information technology has been met with an alarming rate of cyber-
attacks conducted by malicious hackers using sophisticated exploits. Many organizations …

[图书][B] Data mining and machine learning in cybersecurity

S Dua, X Du - 2016 - books.google.com
With the rapid advancement of information discovery techniques, machine learning and data
mining continue to play a significant role in cybersecurity. Although several conferences …

Exploring emerging hacker assets and key hackers for proactive cyber threat intelligence

S Samtani, R Chinn, H Chen… - Journal of Management …, 2017 - Taylor & Francis
Cyber attacks cost the global economy approximately $445 billion per year. To mitigate
attacks, many companies rely on cyber threat intelligence (CTI), or threat intelligence related …

[HTML][HTML] A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

[图书][B] Cyber threat intelligence: challenges and opportunities

M Conti, T Dargahi, A Dehghantanha - 2018 - Springer
The ever increasing number of cyber attacks requires the cyber security and forensic
specialists to detect, analyze and defend against the cyber threats in almost real-time. In …

A supervised machine learning based approach for automatically extracting high-level threat intelligence from unstructured sources

Y Ghazi, Z Anwar, R Mumtaz… - … on Frontiers of …, 2018 - ieeexplore.ieee.org
The last few years have seen a radical shift in the cyber defense paradigm from reactive to
proactive, and this change is marked by the steadily increasing trend of Cyber Threat …

Quality evaluation of cyber threat intelligence feeds

H Griffioen, T Booij, C Doerr - … , ACNS 2020, Rome, Italy, October 19–22 …, 2020 - Springer
In order to mount an effective defense, information about likely adversaries, as well as their
techniques, tactics and procedures is needed. This so-called cyber threat intelligence helps …

A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …

B Shin, PB Lowry - Computers & Security, 2020 - Elsevier
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …