Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

Machine learning aided static malware analysis: A survey and tutorial

A Shalaginov, S Banin, A Dehghantanha… - Cyber threat …, 2018 - Springer
Malware analysis and detection techniques have been evolving during the last decade as a
reflection to development of different malware techniques to evade network-based and host …

Hincti: A cyber threat intelligence modeling and identification system based on heterogeneous information network

Y Gao, X Li, H Peng, B Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber attacks have become increasingly complicated, persistent, organized, and
weaponized. Faces with this situation, drives a rising number of organizations across the …

Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption

O Kayode-Ajala - Applied Research in Artificial Intelligence and …, 2023 - researchberg.com
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …

Trailblazing the artificial intelligence for cybersecurity discipline: A multi-disciplinary research roadmap

S Samtani, M Kantarcioglu, H Chen - ACM Transactions on …, 2020 - dl.acm.org
Cybersecurity has rapidly emerged as a grand societal challenge of the 21st century.
Innovative solutions to proactively tackle emerging cybersecurity challenges are essential to …

Proactively identifying emerging hacker threats from the dark web: A diachronic graph embedding framework (d-gef)

S Samtani, H Zhu, H Chen - ACM Transactions on Privacy and Security …, 2020 - dl.acm.org
Cybersecurity experts have appraised the total global cost of malicious hacking activities to
be $450 billion annually. Cyber Threat Intelligence (CTI) has emerged as a viable approach …

LINKING EXPLOITS FROM THE DARK WEB TO KNOWN VULNERABILITIES FOR PROACTIVE CYBER THREAT INTELLIGENCE: AN ATTENTION-BASED DEEP …

S Samtani, Y Chai, H Chen - MIS quarterly, 2022 - par.nsf.gov
Black hat hackers use malicious exploits to circumvent security controls and take advantage
of system vulnerabilities worldwide, costing the global economy over $450 billion annually …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

Cybersecurity as an industry: A cyber threat intelligence perspective

S Samtani, M Abate, V Benjamin, W Li - The Palgrave Handbook of …, 2020 - Springer
The rapid integration of information technology has been met with an alarming rate of cyber-
attacks conducted by malicious hackers using sophisticated exploits. Many organizations …

The future of artificial intelligence in cybersecurity: A comprehensive survey

F Tao, MS Akhtar, Z Jiayuan - EAI Endorsed Transactions on …, 2021 - publications.eai.eu
AI in Cybersecurity Market scheme helps organizations in observance, detecting, reporting,
and countering cyber threats to keep up information confidentiality. The increasing …