The roadmap to 6G security and privacy

P Porambage, G Gür, DPM Osorio… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …

A Survey on the Applications of Semi-supervised Learning to Cyber-security

PK Mvula, P Branco, GV Jourdan, HL Viktor - ACM Computing Surveys, 2024 - dl.acm.org
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …

6G security challenges and potential solutions

P Porambage, G Gür, DPM Osorio… - 2021 Joint European …, 2021 - ieeexplore.ieee.org
Although the fifth generation wireless networks are yet to be fully investigated, the vision and
key elements of the 6th generation (6G) ecosystem have already come into discussion. In …

Generating fake cyber threat intelligence using transformer-based models

P Ranade, A Piplai, S Mittal, A Joshi… - 2021 International Joint …, 2021 - ieeexplore.ieee.org
Cyber-defense systems are being developed to automatically ingest Cyber Threat
Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge …

From European critical infrastructure protection to the resilience of European critical entities: what does it mean?

C Pursiainen, E Kytömaa - Sustainable and Resilient Infrastructure, 2023 - Taylor & Francis
The article is a public policy analysis of the development of legislation on critical
infrastructure in the European Union (EU), covering 27 developed countries. More precisely …

Creating cybersecurity knowledge graphs from malware after action reports

A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak - IEEE Access, 2020 - ieeexplore.ieee.org
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-
knowledge from these sources would provide security analysts with credible information …

Cybert: Contextualized embeddings for the cybersecurity domain

P Ranade, A Piplai, A Joshi… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
We present CyBERT, a domain-specific Bidirectional Encoder Representations from
Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data …

Deep learning-enabled threat intelligence scheme in the internet of things networks

M Al-Hawawreh, N Moustafa, S Garg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the prevalence of Internet of Things (IoT) systems, there should be a resilient
connection between Space, Air, Ground, and Sea (SAGS) networks to offer automated …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Combining sociocultural intelligence with Artificial Intelligence to increase organizational cyber security provision through enhanced resilience

PRJ Trim, YI Lee - Big Data and Cognitive Computing, 2022 - mdpi.com
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve
cyber security management, not all managers understand the different types of AI/ML and …