[HTML][HTML] An innovative GPT-based open-source intelligence using historical cyber incident reports

F Sufi - Natural Language Processing Journal, 2024 - Elsevier
In contemporary discourse, the pervasive influences of Generative Pre-Trained (GPT) and
Large Language Models (LLM) are evident, showcasing diverse applications. GPT-based …

Harnessing Disaster Tweets: A Deep Dive into Disaster Tweets with EDA, Cleaning, and BERT-based NLP

B Dhamodharan - International Transactions in Artificial Intelligence, 2022 - isjr.co.in
Abstract Natural Language Processing (NLP) techniques play a crucial role in analyzing and
understanding text data, especially in domains such as disaster management where timely …

TTPHunter: automated extraction of actionable intelligence as TTPs from narrative threat reports

N Rani, B Saha, V Maurya, SK Shukla - Proceedings of the 2023 …, 2023 - dl.acm.org
With the proliferation of attacks from various Advanced Persistent Threats (APT) groups, it is
essential to comprehend the threat actor's attack patterns to accelerate threat detection and …

SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence

H Ji, J Yang, L Chai, C Wei, L Yang, Y Duan… - arXiv preprint arXiv …, 2024 - arxiv.org
To address the increasing complexity and frequency of cybersecurity incidents emphasized
by the recent cybersecurity threat reports with over 10 billion instances, cyber threat …

Automatic curation and visualization of crime related information from incrementally crawled multi-source news reports

T Dasgupta, L Dey, R Saha… - Proceedings of the 27th …, 2018 - aclanthology.org
In this paper, we demonstrate a system for the automatic extraction and curation of crime-
related information from multi-source digitally published News articles collected over a …

Open-Source intelligence monitoring for the detection of domestic terrorist activity: Exploring inexplicit linguistic cues to threat and persuasion for natural language …

S Hills, T Jackson, M Sykora - European Conference on Cyber …, 2015 - books.google.com
This early stage work-in-progress doctoral research seeks to consolidate definitions of
persuasive, powerful, and influential language to identify quantifiable key features and …

From threat reports to continuous threat intelligence: a comparison of attack technique extraction methods from textual artifacts

MR Rahman, L Williams - arXiv preprint arXiv:2210.02601, 2022 - arxiv.org
The cyberthreat landscape is continuously evolving. Hence, continuous monitoring and
sharing of threat intelligence have become a priority for organizations. Threat reports …

Casie: Extracting cybersecurity event information from text

T Satyapanich, F Ferraro, T Finin - … of the AAAI conference on artificial …, 2020 - ojs.aaai.org
We present CASIE, a system that extracts information about cybersecurity events from text
and populates a semantic model, with the ultimate goal of integration into a knowledge …

A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions

M Hassanin, N Moustafa - arXiv preprint arXiv:2405.14487, 2024 - arxiv.org
The recent progression of Large Language Models (LLMs) has witnessed great success in
the fields of data-centric applications. LLMs trained on massive textual datasets showed …

Open source intelligence extraction for terrorism‐related information: A review

M Chaudhary, D Bansal - Wiley Interdisciplinary Reviews: Data …, 2022 - Wiley Online Library
In this contemporary era, where a large part of the world population is deluged by extensive
use of the internet and social media, terrorists have found it a potential opportunity to …