A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline

L Alevizos, M Dekker - Electronics, 2024 - mdpi.com
Cyber threats continue to evolve in complexity, thereby traditional cyber threat intelligence
(CTI) methods struggle to keep pace. AI offers a potential solution, automating and …

The Model of Server Virtualization System Protection in the Educational Institution Local Network

V Lakhno, B Akhmetov, B Yagaliyeva… - Mobile Computing and …, 2023 - Springer
A new approach for the information security (IS) improvement of the educational institution's
network has been proposed. The proposed approach is structured and systematic. It allows …

Explainable Multi-Modal Learning in Remote Sensing: Challenges and Future Directions

A Günther, H Najjar, A Dengel - IEEE Geoscience and Remote …, 2024 - ieeexplore.ieee.org
Earth observation applications effectively leverage deep learning (DL) models to harness
the abundantly available remote sensing (RS) data. In order to use all the different …

Модель захисту локальної мережі навчального закладу серверної системи віртуалізації

V Lakhno, K Yerbolat, Y Bagdat… - Електронне …, 2022 - csecurity.kubg.edu.ua
Анотація Запропоновано новий підхід для удосконалення інформаційної безпеки (ІБ)
мережі навчального закладу. Пропонований підхід–структурований і системний. Ще …

CrisisKAN: Knowledge-Infused and Explainable Multimodal Attention Network for Crisis Event Classification

S Gupta, N Saini, S Kundu, D Das - European Conference on Information …, 2024 - Springer
Pervasive use of social media has become the emerging source for real-time information
(like images, text, or both) to identify various events. Despite the rapid growth of image and …

Dark Web Content Classification Using Quantum Encoding

A Dalvi, S Bhoir, F Kazi… - Quantum Computing in …, 2023 - Wiley Online Library
The study of cyber terrorism is relatively new and still in its infancy. Nevertheless,
researchers and security professionals consider data collected from the dark web as one of …

Unveiling the dark: Analyzing and Categorizing dark web activities using Bi-Directional LSTMs

S Vishal, M Varun - 2024 2nd International Conference on …, 2024 - ieeexplore.ieee.org
The term" dark web" refers to a broad range of illegal actions which are performed by
unidentified individuals or groups, making it hard to identify their origins. The illicit material …

[PDF][PDF] A 5G Security Recommendation System Based on Multi-Modal Learning and Large Language Models

JW Yao - 2023 - spectrum.library.concordia.ca
Deploying 5G networks on top of cloud-native environments provides unique benefits
including cost-effectiveness, flexibility, and scalability. However, the increased complexity of …