Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

A holistic review of cybersecurity and reliability perspectives in smart airports

N Koroniotis, N Moustafa, F Schiliro… - IEEE …, 2020 - ieeexplore.ieee.org
Advances in the Internet of Things (IoT) and aviation sector have resulted in the emergence
of smart airports. Services and systems powered by the IoT enable smart airports to have …

Artificial intelligence and machine learning

N Kühl, M Schemmer, M Goutier, G Satzger - Electronic Markets, 2022 - Springer
Within the last decade, the application of “artificial intelligence” and “machine learning” has
become popular across multiple disciplines, especially in information systems. The two …

Evaluating the cyber security readiness of organizations and its influence on performance

S Hasan, M Ali, S Kurnia, R Thurasamy - Journal of Information Security …, 2021 - Elsevier
The acceleration of cyber-attacks in recent years has negatively impacted the overall
performance of organizations around the world. Organizations face the challenge of …

A review of threat modelling approaches for APT-style attacks

M Tatam, B Shanmugam, S Azam, K Kannoorpatti - Heliyon, 2021 - cell.com
Threats are potential events, intentional or not, that compromise the confidentiality, integrity,
and/or availability of information systems. Defending against threats and attacks requires …

Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the bitcoin blockchain

HH Sun Yin, K Langenheldt, M Harlev… - Journal of …, 2019 - Taylor & Francis
Bitcoin is a cryptocurrency whose transactions are recorded on a distributed, openly
accessible ledger. On the Bitcoin Blockchain, an owning entity's real-world identity is hidden …

Hincti: A cyber threat intelligence modeling and identification system based on heterogeneous information network

Y Gao, X Li, H Peng, B Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber attacks have become increasingly complicated, persistent, organized, and
weaponized. Faces with this situation, drives a rising number of organizations across the …

Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption

O Kayode-Ajala - Applied Research in Artificial Intelligence and …, 2023 - researchberg.com
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …

Deep transfer learning & beyond: Transformer language models in information systems research

R Gruetzemacher, D Paradice - ACM Computing Surveys (CSUR), 2022 - dl.acm.org
AI is widely thought to be poised to transform business, yet current perceptions of the scope
of this transformation may be myopic. Recent progress in natural language processing …

A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

B Biswas, A Mukhopadhyay, S Bhattacharjee… - Decision Support …, 2022 - Elsevier
Online hacker communities are meeting spots for aspiring and seasoned cybercriminals
where they engage in technical discussions, share exploits and relevant hacking tools to be …