Cyner: Information extraction from unstructured text of cti sources with noncontextual iocs

S Fujii, N Kawaguchi, T Shigemoto… - International Workshop on …, 2022 - Springer
Cybersecurity threats have been increasing and growing more sophisticated year by year. In
such circumstances, gathering Cyber Threat Intelligence (CTI) and following up with up-to …

The tweet advantage: An empirical analysis of 0-day vulnerability information shared on twitter

C Sauerwein, C Sillaber, MM Huber… - ICT Systems Security …, 2018 - Springer
In the last couple of years, the number of software vulnerabilities and corresponding
incidents increased significantly. In order to stay up-to-date about these new emerging …

Extracting and Analyzing Cybersecurity Named Entity and its Relationship with Noncontextual IOCs from Unstructured Text of CTI Sources

S Fujii, N Kawaguchi, T Shigemoto… - Journal of Information …, 2023 - jstage.jst.go.jp
The increasing frequency and sophistication of cyberattacks makes it essential to keep up-to-
date with threat information by using cyber threat intelligence (CTI). Structured CTI such as …

[PDF][PDF] Research on Sophistication and Improving Efficiency of Practical Security Operations

S Fujii - 2023 - ousar.lib.okayama-u.ac.jp
There are more cyberattacks each year, with the number of communications subjected to
such attacks observed per year between 2018 and 2021 increasing by approximately 2.4 …