What are the attackers doing now? Automating cyberthreat intelligence extraction from text on pace with the changing threat landscape: A survey

MR Rahman, RM Hezaveh, L Williams - ACM Computing Surveys, 2023 - dl.acm.org
Cybersecurity researchers have contributed to the automated extraction of CTI from textual
sources, such as threat reports and online articles describing cyberattack strategies …

NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arXiv preprint arXiv …, 2023 - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Processing tweets for cybersecurity threat awareness

F Alves, A Bettini, PM Ferreira, A Bessani - Information Systems, 2021 - Elsevier
Receiving timely and relevant security information is crucial for maintaining a high-security
level on an IT infrastructure. This information can be extracted from Open Source …

Cysecalert: An alert generation system for cyber security events using open source intelligence data

T Riebe, T Wirth, M Bayer, P Kühn, MA Kaufhold… - … on Information and …, 2021 - Springer
Receiving relevant information on possible cyber threats, attacks, and data breaches in a
timely manner is crucial for early response. The social media platform Twitter hosts an active …

Detecting cyber threat event from twitter using IDCNN and BiLSTM

Y Fang, J Gao, Z Liu, C Huang - Applied Sciences, 2020 - mdpi.com
In the context of increasing cyber threats and attacks, monitoring and analyzing network
security incidents in a timely and effective way is the key to ensuring network infrastructure …

A Survey on Detection of cybersecurity threats on Twitter using deep learning

O Alsodi, X Zhou, R Gururajan… - 2021 8th International …, 2021 - ieeexplore.ieee.org
In these times of increasing cybersecurity threats, monitoring and analysing cybersecurity
events in a timely and effective way is the key to promote social media security. Twitter is …

Cross-site Scripting Threat Intelligence Detection Based on Deep Learning

Z Liu, Y Fang, Y Xu - International Conference on Frontiers in Cyber …, 2022 - Springer
In an increasingly complex cyber environment, where the role of traditional protection tools
is increasingly limited, intelligence is the key point in the battle. Through the information …