[HTML][HTML] Artificial intelligence for cybersecurity: Literature review and future research directions

R Kaur, D Gabrijelčič, T Klobučar - Information Fusion, 2023 - Elsevier
Artificial intelligence (AI) is a powerful technology that helps cybersecurity teams automate
repetitive tasks, accelerate threat detection and response, and improve the accuracy of their …

Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

Distributed denial of service attack prediction: Challenges, open issues and opportunities

AB de Neira, B Kantarci, M Nogueira - Computer Networks, 2023 - Elsevier
Abstract Distributed Denial of Service (DDoS) attack is one of the biggest cyber threats.
DDoS attacks have evolved in quantity and volume to evade detection and increase …

Detecting cryptocurrency pump-and-dump frauds using market and social signals

H Nghiem, G Muric, F Morstatter, E Ferrara - Expert Systems with …, 2021 - Elsevier
The cryptocurrency market has gained significant traction in the last decade, becoming an
alternative finance platform to traditional stock market trading. Despite its rapid evolution …

The art of cybercrime community research

J Hughes, S Pastrana, A Hutchings, S Afroz… - ACM Computing …, 2024 - dl.acm.org
In the last decade, cybercrime has risen considerably. One key factor is the proliferation of
online cybercrime communities, where actors trade products and services, and also learn …

{SourceFinder}: Finding malware {Source-Code} from publicly available repositories in {GitHub}

MOF Rokon, R Islam, A Darki, EE Papalexakis… - … on Research in Attacks …, 2020 - usenix.org
Where can we find malware source code? This question is motivated by a real need: there is
a dearth of malware source code, which impedes various types of security research. Our …

Mentions of security vulnerabilities on reddit, twitter and github

S Horawalavithana, A Bhattacharjee, R Liu… - IEEE/WIC/ACM …, 2019 - dl.acm.org
Activity on social media is seen as a relevant sensor for different aspects of the society. In a
heavily digitized society, security vulnerabilities pose a significant threat that is publicly …

Processing tweets for cybersecurity threat awareness

F Alves, A Bettini, PM Ferreira, A Bessani - Information Systems, 2021 - Elsevier
Receiving timely and relevant security information is crucial for maintaining a high-security
level on an IT infrastructure. This information can be extracted from Open Source …

Automated emerging cyber threat identification and profiling based on natural language processing

R Marinho, R Holanda - IEEE Access, 2023 - ieeexplore.ieee.org
The time window between the disclosure of a new cyber vulnerability and its use by
cybercriminals has been getting smaller and smaller over time. Recent episodes, such as …

Gathering cyber threat intelligence from Twitter using novelty classification

BD Le, G Wang, M Nasim, A Babar - arXiv preprint arXiv:1907.01755, 2019 - arxiv.org
Preventing organizations from Cyber exploits needs timely intelligence about Cyber
vulnerabilities and attacks, referred as threats. Cyber threat intelligence can be extracted …