A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

[HTML][HTML] Evolving techniques in cyber threat hunting: A systematic review

A Mahboubi, K Luong, H Aboutorab, HT Bui… - Journal of Network and …, 2024 - Elsevier
In the rapidly changing cybersecurity landscape, threat hunting has become a critical
proactive defense against sophisticated cyber threats. While traditional security measures …

Deep learning-enabled threat intelligence scheme in the internet of things networks

M Al-Hawawreh, N Moustafa, S Garg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the prevalence of Internet of Things (IoT) systems, there should be a resilient
connection between Space, Air, Ground, and Sea (SAGS) networks to offer automated …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

[HTML][HTML] Explainable deep learning for attack intelligence and combating cyber–physical attacks

M Al-Hawawreh, N Moustafa - Ad Hoc Networks, 2024 - Elsevier
Cyber–physical control loops comprising sensors, actuators and controllers pose the most
valued and critical part of the industrial Internet of Things (IIoT) as it regulates the state of the …

Development of a method for constructing linguistic standards for multi-criteria assessment of honeypot efficiency

A Korchenko, V Breslavskyi, S Yevseiev… - 2021 - repository.hneu.edu.ua
One of the pressing areas that is developing in the field of information security is associated
with the use of Honeypots (virtual decoys, online traps), and the selection of criteria for …

[HTML][HTML] H-DOCTOR: Honeypot based firewall tuning for attack prevention

MR Amal, P Venkadesh - Measurement: Sensors, 2023 - Elsevier
A honeypot is a well-known entrapment technique used by network and Internet of Things
(IoT) security professionals to lure intruders. Unlike traditional security measures, they can …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

[PDF][PDF] Siber Güvenlik ve Savunma

Ş Sağıroğlu, M Alkan - Grafiker Yayınları, Ankara, 2018 - researchgate.net
BGD'nin vizyonu;“bilgi güvenliği alanında ulusal ve uluslararası düzeyde tarafsız, güvenilir
ve et in bir ulusal sivil toplum uruluşu olma tır.” BGD amacı doğrultusunda; tüm paydaşlarla …