A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Llm-tikg: Threat intelligence knowledge graph construction utilizing large language model

Y Hu, F Zou, J Han, X Sun, Y Wang - Computers & Security, 2024 - Elsevier
Open-source threat intelligence is often unstructured and cannot be directly applied to the
next detection and defense. By constructing a knowledge graph through open-source threat …

Lpg-based knowledge graphs: A survey, a proposal and current trends

D Di Pierro, S Ferilli, D Redavid - Information, 2023 - mdpi.com
A significant part of the current research in the field of Artificial Intelligence is devoted to
knowledge bases. New techniques and methodologies are emerging every day for the …

A comprehensive evaluation of machine learning algorithms for web application attack detection with knowledge graph integration

M Ismail, S Alrabaee, KKR Choo, L Ali… - Mobile Networks and …, 2024 - Springer
The capability to accurately detect web application attacks, especially in a timely fashion, is
crucial but remains an ongoing challenge. This study provides an in-depth evaluation of 19 …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion

N Xiao, B Lang, T Wang, Y Chen - Computers & Security, 2024 - Elsevier
Threat actor attribution is a crucial defense strategy for combating advanced persistent
threats (APTs). Cyber threat intelligence (CTI), which involves analyzing multisource …

Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis

J Jia, L Yang, Y Wang, A Sang - Computers & Security, 2025 - Elsevier
Cybersecurity experts are actively exploring and implementing automated technologies to
extract and present attack information from Cyber Threat Intelligence. However, there are …

[HTML][HTML] Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review

C Bratsas, EK Anastasiadis, AK Angelidis… - … of Cybersecurity and …, 2024 - mdpi.com
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing.
The extracted information can provide security analysts with useful Cyber Threat Intelligence …

Optimal Attack Path Planning based on Reinforcement Learning and Cyber Threat Knowledge Graph Combining the ATT&CK for Air Traffic Management System

C Liu, B Wang, F Li, J Tian, Y Yang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
With the development of the Air Traffic Management System (ATM), the ATM network has
transitioned from a closed physical isolation network to an open Cyber-Physical System …