A systematic threat analysis and defense strategies for the metaverse and extended reality systems

S Qamar, Z Anwar, M Afzal - Computers & Security, 2023 - Elsevier
With the rapid development and evolution of immersive technologies there are growing
concerns of security and privacy threats to the metaverse and extended reality (XR) systems …

Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

A survey on technical threat intelligence in the age of sophisticated cyber attacks

W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …

A comparative study on cyber threat intelligence: The security incident response perspective

D Schlette, M Caselli, G Pernul - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …

Metaverse Banking Service: Are We Ready to Adopt? A Deep Learning‐Based Dual‐Stage SEM‐ANN Analysis

LT Nguyen, DTV Duc, TQ Dang… - Human Behavior and …, 2023 - Wiley Online Library
Metaverse banking service is the transformation from online banking to a metaverse
environment that allows customers to access banking services and interact with …

[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

[PDF][PDF] Cyber threat intelligence–issue and challenges

MS Abu, SR Selamat, A Ariffin, R Yusof - Indonesian Journal of …, 2018 - academia.edu
Today threat landscape evolving at the rapid rate with much organization continuously face
complex and malicious cyber threats. Cybercriminal equipped by better skill, organized and …

A Data Triage Retrieval System for Cyber Security Operations Center

T Lin - 2018 - etda.libraries.psu.edu
Triage analysis is a fundamental stage in cyber operations in Security Operations Centers
(SOCs). The massive data sources generate great demands on cyber security analysts' …

Hincti: A cyber threat intelligence modeling and identification system based on heterogeneous information network

Y Gao, X Li, H Peng, B Fang… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Cyber attacks have become increasingly complicated, persistent, organized, and
weaponized. Faces with this situation, drives a rising number of organizations across the …

Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives

C Sauerwein, C Sillaber, A Mussmann, R Breu - 2017 - aisel.aisnet.org
In the last couple of years, organizations have demonstrated an increased willingness to
exchange information and knowledge regarding vulnerabilities, threats, incidents and …