A survey on machine learning techniques for cyber security in the last decade

K Shaukat, S Luo, V Varadharajan, IA Hameed… - IEEE …, 2020 - ieeexplore.ieee.org
Pervasive growth and usage of the Internet and mobile applications have expanded
cyberspace. The cyberspace has become more vulnerable to automated and prolonged …

Blockchain-based cyber threat intelligence system architecture for sustainable computing

J Cha, SK Singh, Y Pan, JH Park - Sustainability, 2020 - mdpi.com
Nowadays, the designing of cyber-physical systems has a significant role and plays a
substantial part in developing a sustainable computing ecosystem for secure and scalable …

A survey of the dark web and dark market research

H Zhang, F Zou - 2020 IEEE 6th international conference on …, 2020 - ieeexplore.ieee.org
The Dark Web is a web-based content based on anonymous communication systems that
protects users and protects anonymity through technologies such as traffic encryption …

Monitoring social media for vulnerability-threat prediction and topic analysis

SY Huang, T Ban - 2020 IEEE 19th International Conference on …, 2020 - ieeexplore.ieee.org
Publicly available software vulnerabilities and exploit code are often abused by malicious
actors to launch cyberattacks to vulnerable targets. Organizations not only have to update …

POSTER: dynamic software vulnerabilities threat prediction through social media contextual analysis

SY Huang, Y Wu - Proceedings of the 15th ACM Asia Conference on …, 2020 - dl.acm.org
Publicly available software vulnerabilities and exploit codes are often utilized by malicious
actors to launch cyberattack to vulnerable targets. Therefore, organizations not only need to …

[PDF][PDF] Моделі кібератак в системі інформаційної безпеки підприємства на основі використання фріланс-ресурсу

ОВ БАРАБАШ - 2020 - dut.edu.ua
У дисертаційній роботі досліджено стратегічні пріоритети системи інформаційної
безпеки підприємства, що залучає фріланс-ресурс, а також досліджено систему …