Deep learning algorithms for cybersecurity applications: A technological and status review

P Dixit, S Silakari - Computer Science Review, 2021 - Elsevier
Cybersecurity mainly prevents the hardware, software, and data present in the system that
has an active internet connection from external attacks. Organizations mainly deploy …

A survey on technical threat intelligence in the age of sophisticated cyber attacks

W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …

Cyber security in smart cities: a review of deep learning-based applications and case studies

D Chen, P Wawrzynski, Z Lv - Sustainable Cities and Society, 2021 - Elsevier
On the one hand, smart cities have brought about various changes, aiming to revolutionize
people's lives. On the other hand, while smart cities bring better life experiences and great …

Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

Evaluating the cyber security readiness of organizations and its influence on performance

S Hasan, M Ali, S Kurnia, R Thurasamy - Journal of Information Security …, 2021 - Elsevier
The acceleration of cyber-attacks in recent years has negatively impacted the overall
performance of organizations around the world. Organizations face the challenge of …

A comparative study on cyber threat intelligence: The security incident response perspective

D Schlette, M Caselli, G Pernul - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …

[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …

Misp: The design and implementation of a collaborative threat intelligence sharing platform

C Wagner, A Dulaunoy, G Wagener… - Proceedings of the 2016 …, 2016 - dl.acm.org
The IT community is confronted with incidents of all kinds and nature, new threats appear on
a daily basis. Fighting these security incidents individually is almost impossible. Sharing …

[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

[HTML][HTML] Cyber-threat perception and risk management in the Swedish financial sector

S Varga, J Brynielsson, U Franke - Computers & security, 2021 - Elsevier
The financial sector relies heavily on information systems for business. This study sets out to
investigate cyber situation awareness in the financial sector in Sweden, by examining what …