Threats from the dark: a review over dark web investigation research for cyber threat intelligence

R Basheer, B Alkhatib - Journal of Computer Networks and …, 2021 - Wiley Online Library
From proactive detection of cyberattacks to the identification of key actors, analyzing
contents of the Dark Web plays a significant role in deterring cybercrimes and understanding …

[HTML][HTML] An integrated approach for post-disaster flood management via the use of cutting-edge technologies and UAVs: A review

HS Munawar, AWA Hammad, ST Waller, MJ Thaheem… - Sustainability, 2021 - mdpi.com
Rapid advances that improve flood management have facilitated the disaster response by
providing first aid services, finding safe routes, maintaining communication and developing …

Machine learning and internet of things applications in enterprise architectures: Solutions, challenges, and open issues

Z Rehman, N Tariq, SA Moqurrab, J Yoo… - Expert …, 2024 - Wiley Online Library
The rapid growth of the Internet of Things (IoT) has led to its widespread adoption in various
industries, enabling enhanced productivity and efficient services. Integrating IoT systems …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

A comparative analysis of information and artificial intelligence toward national security

MN Al-Suqri, M Gillani - IEEE Access, 2022 - ieeexplore.ieee.org
Information is inevitable when it comes to national security. The information revolution
seems to hold the massive potential to strengthen national security against current and …

[HTML][HTML] An ai/ml-based strategy for disaster response and evacuation of victims in aged care facilities in the Hawkesbury-Nepean Valley: A perspective

HS Munawar, M Mojtahedi, AWA Hammad, MJ Ostwald… - Buildings, 2022 - mdpi.com
The Hawkesbury-Nepean Valley, Australia's longest coastal catchment, is spanned by a
river system of more than 470 km, that runs from Goulburn to Broken Bay, covering a total …

[HTML][HTML] A threat intelligence framework for protecting smart satellite-based healthcare networks

M Al-Hawawreh, N Moustafa, J Slay - Neural Computing and Applications, 2024 - Springer
Abstract Human-to-machine (H2M) communication is an important evolution in the industrial
internet of health things (IIoHT), where many H2M interfaces are remotely interacting with …

Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey

M Humayun, N Tariq, M Alfayad, M Zakwan… - IEEE …, 2024 - ieeexplore.ieee.org
The Internet of Things (IoT) has revolutionized various domains, enabling interconnected
devices to communicate and exchange data. The integration of Artificial Intelligence (AI) in …

Implementation of cyber threat intelligence platform on Internet of Things (IoT) using TinyML approach for deceiving cyber invasion

A Dutta, S Kant - 2021 International Conference on Electrical …, 2021 - ieeexplore.ieee.org
In recent past years' application of Internet of Things (IoT) technology has been radically
enhanced in various domain across the sphere. Due to less computational capabilities and …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …