In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …
Receiving timely and relevant security information is crucial for maintaining a high-security level on an IT infrastructure. This information can be extracted from Open Source …
Receiving relevant information on possible cyber threats, attacks, and data breaches in a timely manner is crucial for early response. The social media platform Twitter hosts an active …
Y Fang, J Gao, Z Liu, C Huang - Applied Sciences, 2020 - mdpi.com
In the context of increasing cyber threats and attacks, monitoring and analyzing network security incidents in a timely and effective way is the key to ensuring network infrastructure …
In these times of increasing cybersecurity threats, monitoring and analysing cybersecurity events in a timely and effective way is the key to promote social media security. Twitter is …
Z Liu, Y Fang, Y Xu - International Conference on Frontiers in Cyber …, 2022 - Springer
In an increasingly complex cyber environment, where the role of traditional protection tools is increasingly limited, intelligence is the key point in the battle. Through the information …