Cyber threat intelligence model: an evaluation of taxonomies, sharing standards, and ontologies within cyber threat intelligence

V Mavroeidis, S Bromander - 2017 European Intelligence and …, 2017 - ieeexplore.ieee.org
Threat intelligence is the provision of evidence-based knowledge about existing or potential
threats. Benefits of threat intelligence include improved efficiency and effectiveness in …

[PDF][PDF] Toward a knowledge graph of cybersecurity countermeasures

PE Kaloroumakis, MJ Smith - The MITRE Corporation, 2021 - next.d3fend.mitre.org
This paper describes our research and development toward a precise, unambiguous, and
information-dense knowledge graph of cybersecurity countermeasures. In project work for …

Towards an ontology for privacy requirements via a systematic literature review

M Gharib, P Giorgini, J Mylopoulos - Conceptual Modeling: 36th …, 2017 - Springer
Privacy has been frequently identified as a main concern for systems that deal with personal
information. However, much of existing work on privacy requirements deals with them as a …

Review into state of the art of vulnerability assessment using artificial intelligence

S Khan, S Parkinson - Guide to Vulnerability Analysis for Computer …, 2018 - Springer
Vulnerability assessment is the essential and well-established process of probing security
flaws, weaknesses and inadequacies in a computing infrastructure. The process helps …

Linking threat tactics, techniques, and patterns with defensive weaknesses, vulnerabilities and affected platform configurations for cyber hunting

E Hemberg, J Kelly, M Shlapentokh-Rothman… - arXiv preprint arXiv …, 2020 - arxiv.org
Many public sources of cyber threat and vulnerability information exist to help defend cyber
systems. This paper links MITRE's ATT&CK MATRIX of Tactics and Techniques, NIST's …

Digital healthcare-cyberattacks in asian organizations: an analysis of vulnerabilities, risks, nist perspectives, and recommendations

K Kandasamy, S Srinivas, K Achuthan… - IEEE Access, 2022 - ieeexplore.ieee.org
Cyberattacks on healthcare institutions are on an upsurge all over the world. Recently, Asian
hospitals have become targets of numerous cyberattacks. While Western countries like the …

Ontological approach toward cybersecurity in cloud computing

T Takahashi, Y Kadobayashi, H Fujiwara - Proceedings of the 3rd …, 2010 - dl.acm.org
Widespread deployment of the Internet enabled building of an emerging IT delivery model,
ie, cloud computing. Albeit cloud computing-based services have rapidly developed, their …

A framework for conceptual characterization of ontologies and its application in the cybersecurity domain

BF Martins, LJ Serrano Gil, JF Reyes Román… - Software and Systems …, 2022 - Springer
Organizations are actively seeking efficient solutions for the management and protection of
their assets. However, Cybersecurity is a vast and complex domain, especially for large …

Data-driven threat hunting using sysmon

V Mavroeidis, A Jøsang - … of the 2nd international conference on …, 2018 - dl.acm.org
Threat actors can be persistent, motivated and agile, and they leverage a diversified and
extensive set of tactics, techniques, and procedures to attain their goals. In response to that …

Vulnerability scrying method for software vulnerability discovery prediction without a vulnerability database

S Rahimi, M Zargham - IEEE Transactions on Reliability, 2013 - ieeexplore.ieee.org
Predicting software vulnerability discovery trends can help improve secure deployment of
software applications and facilitate backup provisioning, disaster recovery, diversity …