UNCOVERING EVIDENCE OF ATTACKER BEHAVIOR ON THE NETWORK

A Yaseen - ResearchBerg Review of Science and Technology, 2020 - researchberg.com
This comprehensive research presents and investigates a diverse assessment of
interruption discovery strategies and their job in contemporary online protection. Interruption …

[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence

E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …

Taxonomical challenges for cyber incident response threat intelligence: A review

M Ammi, O Adedugbe, FM Alharby… - International Journal of …, 2022 - igi-global.com
As attackers continue to devise new means of exploiting vulnerabilities in computer systems,
security personnel are doing their best to identify loopholes and threats. Analysis of threats …

[HTML][HTML] Context-aware cyber-threat attribution based on hybrid features

E Irshad, AB Siddiqui - ICT Express, 2024 - Elsevier
With the rapid technological development, identifying the attackers behind cyber-attacks is
getting more sophisticated. To cope with this phenomenon, the current process of cyber …

Cyber-attacks risk analysis method for different levels of automation of mining processes in mines based on fuzzy theory use

AA Tubis, S Werbińska-Wojciechowska, M Góralczyk… - Sensors, 2020 - mdpi.com
The rising automation level and development of the Industry 4.0 concept in the mining sector
increase the risk of cyber-attacks. As a result, this article focuses on developing a risk …

Cyber attacker profiling for risk analysis based on machine learning

I Kotenko, E Fedorchenko, E Novikova, A Jha - Sensors, 2023 - mdpi.com
The notion of the attacker profile is often used in risk analysis tasks such as cyber attack
forecasting, security incident investigations and security decision support. The attacker …

A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)

M Plachkinova - Communications of the Association for Information …, 2023 - aisel.aisnet.org
Cybercrime against critical infrastructures such as nuclear reactors, power plants, and dams
has been increasing in frequency and severity. Recent literature regarding these types of …

Improved population intelligence algorithm and BP neural network for network security posture prediction

Y Li, F Wu - International Journal of Distributed Sensor …, 2023 - Wiley Online Library
To address the problems of low prediction accuracy and slow convergence of the network
security posture prediction model, a population intelligence optimization algorithm is …

Modeling Intruder Reconnaissance Behavior through State Diagrams to Support Defensive Deception

I Belalis, G Spathoulas, I Anagnostopoulos - Journal of Cybersecurity and …, 2023 - mdpi.com
Active reconnaissance is the primary source of information gathering about the infrastructure
of a target network for intruders. Its main functions are host discovery and port scanning, the …

[HTML][HTML] Examining the cyclical nature of crimes: A looped crime script of data theft from organizational networks

R Madarie, MW Kranenbarg, C de Poot - Computers in Human Behavior …, 2025 - Elsevier
Prior research on network attacks is predominantly technical, yet little is known about
behavioral patterns of attackers inside computer systems. This study adopts a criminological …