A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

Blockchain-Based Data Breach Detection: Approaches, Challenges, and Future Directions

K Ansar, M Ahmed, M Helfert, J Kim - Mathematics, 2023 - mdpi.com
In cybersecurity, personal data breaches have become one of the significant issues. This
fact indicates that data breaches require unique detection systems, techniques, and …

[HTML][HTML] Blockchain-based model for incentivized cyber threat intelligence sharing

A Venčkauskas, V Jusas, D Barisas, B Misnevs - Applied Sciences, 2024 - mdpi.com
Sharing cyber threat intelligence (CTI) can significantly improve the security of information
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

[HTML][HTML] SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing

M Kumar, G Epiphaniou, C Maple - Internet of Things, 2024 - Elsevier
Abstract Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to
defend against cyberattacks. However, current methods often fail to adequately protect …

Cyber Threat Intelligence on Blockchain: A Systematic Literature Review

D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …

Artificial Intelligence and Large Language Models in Advancing Cyber Threat Intelligence: A Systematic Literature Review

H Alturkistani, S Chuprat - 2024 - researchsquare.com
Abstract The evolution of Cyber Threat Intelligence (CTI) is pivotal in addressing the
increasingly sophisticated landscape of cyber threats. Traditional CTI methods, while …

Malicious Data Traceability and Throughput Optimization Using Blockchain (IOTA Smart Contracts) for Next Generation Internet of Vehicles

MN Halgamuge - IEEE Transactions on Vehicular Technology, 2024 - ieeexplore.ieee.org
The Internet of Vehicles (IoV) faces security threats from malicious entities that endanger
vehicles. However, traditional centralized networks have limitations in scalability, latency …

A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds

JH Al-Yasiri, MFB Zolkipli, NFNM Farid… - 2024 7th …, 2024 - ieeexplore.ieee.org
In response to the escalating cyber threats, the efficiency of Cyber Threat Intelligence (CTI)
data collection has become paramount in ensuring robust cybersecurity. However, existing …

Securing Indonesian Hoax News Dataset with Blockchain, IPFS, and Voting Mechanism

AR Arifudin, RN Yasa - 2023 3rd International Conference on …, 2023 - ieeexplore.ieee.org
The spread of fake news and hoaxes on the internet has become a serious issue, with
inaccurate information being presented as fact and affecting public opinion. Machine …