Trusting artificial intelligence in cybersecurity is a double-edged sword

M Taddeo, T McCutcheon, L Floridi - Nature Machine Intelligence, 2019 - nature.com
Applications of artificial intelligence (AI) for cybersecurity tasks are attracting greater
attention from the private and the public sectors. Estimates indicate that the market for AI in …

Generating fake cyber threat intelligence using transformer-based models

P Ranade, A Piplai, S Mittal, A Joshi… - 2021 International Joint …, 2021 - ieeexplore.ieee.org
Cyber-defense systems are being developed to automatically ingest Cyber Threat
Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge …

Creating cybersecurity knowledge graphs from malware after action reports

A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak - IEEE Access, 2020 - ieeexplore.ieee.org
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-
knowledge from these sources would provide security analysts with credible information …

Cybert: Contextualized embeddings for the cybersecurity domain

P Ranade, A Piplai, A Joshi… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
We present CyBERT, a domain-specific Bidirectional Encoder Representations from
Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data …

Deep learning-enabled threat intelligence scheme in the internet of things networks

M Al-Hawawreh, N Moustafa, S Garg… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
With the prevalence of Internet of Things (IoT) systems, there should be a resilient
connection between Space, Air, Ground, and Sea (SAGS) networks to offer automated …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Cyber sentinel: Exploring conversational agents in streamlining security tasks with gpt-4

M Kaheh, DK Kholgh, P Kostakos - arXiv preprint arXiv:2309.16422, 2023 - arxiv.org
In an era where cyberspace is both a battleground and a backbone of modern society, the
urgency of safeguarding digital assets against ever-evolving threats is paramount. This …

Distributed security framework for reliable threat intelligence sharing

D Preuveneers, W Joosen… - Security and …, 2020 - Wiley Online Library
Computer security incident response teams typically rely on threat intelligence platforms for
information about sightings of cyber threat events and indicators of compromise. Other …

Combating fake cyber threat intelligence using provenance in cybersecurity knowledge graphs

S Mitra, A Piplai, S Mittal, A Joshi - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
Today there is a significant amount of fake cybersecurity related intelligence on the internet.
To filter out such information, we build a system to capture the provenance information and …

SmartValidator: A framework for automatic identification and classification of cyber threat data

C Islam, MA Babar, R Croft, H Janicke - Journal of Network and Computer …, 2022 - Elsevier
A wide variety of Cyber Threat Information (CTI) is used by Security Operation Centres
(SOCs) to perform validation of security incidents and alerts. Security experts manually …