Enthusiastic Cyber Surveillance for Intimidation Comprehension on the Dark Web and the Deep Web

V Mahor, S Bijrothiya, RK Bhujade… - … Intelligence for the …, 2022 - igi-global.com
The authors offer an operational method for obtaining cyber intimidation intelligence from
diverse social platforms on the internet, notably dark-web and deep-web sites with Tor, in …

Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

A Diab, A Thart, P Shakarian, J Shakarian, J Robertson… - 2016 - krimdok.uni-tuebingen.de
In this paper, we present an operational system for cyber threat intelligence gathering from
various social platforms on the Internet particularly sites on the darknet and deepnet. We …

Advancing Cyber Threat Intelligence through Machine Learning Algorithms

V Varbanov - Proceedings of the Cognitive Models and Artificial …, 2024 - dl.acm.org
In the domain of Cyber Threat Intelligence (CTI) the enigmatic depths of the Dark Web are
pivotal for the early identification of nascent cyber threats. Yet, the voluminous and sprawling …

Unmasking deceptive attacks with machine learning

P Peterson - Computer Fraud & Security, 2018 - magonlinelibrary.com
The success of a cyber attack is increasingly dictated not by the use of the most nefarious
zero-day malware weapons, but by the strength of the attackers' ability to deceive their …

Leveraging Artificial Intelligence for Predictive Cyber Threat Intelligence

VV Vegesna, A Adepu - International Journal of Creative Research In …, 2024 - jrctd.in
As cyber threats become increasingly complex and dynamic, traditional reactive security
measures are proving inadequate. This paper proposes a predictive cyber threat …

Extracting cyber threat intelligence from hacker forums

I Deliu - 2017 - ntnuopen.ntnu.no
The use of more sophisticated tools and methods from cyber criminals has urged the cyber
security community to look for enhancements to traditional security controls. Cyber Threat …

[图书][B] Darkweb cyber threat intelligence mining

J Robertson, A Diab, E Marin, E Nunes, V Paliath… - 2017 - books.google.com
The important and rapidly emerging new field known as' cyber threat intelligence'explores
the paradigm that defenders of computer networks gain a better understanding of their …

Towards automatically evaluating security risks and providing cyber intelligence

X Liao - 2017 - repository.gatech.edu
The cyber threat landscape is quickly changing, and it is of vital importance to stay abreast of
emerging threats and to proactively work to improve security. At the same time, piecing …

Introduction to special issue on terrorism informatics

H Chen, Y Zhou, EF Reid, CA Larson - Information systems frontiers, 2011 - Springer
Since September 11th, the multidisciplinary field of terrorism informatics has experienced
tremendous growth, and research communities as well as local, state, and national …

Exploring hackers assets: topics of interest as indicators of compromise

M Al-Ramahi, I Alsmadi, J Davenport - … of the 7th Symposium on Hot …, 2020 - dl.acm.org
The need to develop actionable intelligence that is proactive is very critical to current
security controls and systems. Hackers and hacking techniques continue to grow and …