Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
Llm-tikg: Threat intelligence knowledge graph construction utilizing large language model
Y Hu, F Zou, J Han, X Sun, Y Wang - Computers & Security, 2024 - Elsevier
Open-source threat intelligence is often unstructured and cannot be directly applied to the
next detection and defense. By constructing a knowledge graph through open-source threat …
next detection and defense. By constructing a knowledge graph through open-source threat …
Graph neural networks for intrusion detection: A survey
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
To counteract the rapidly evolving cyber threats, many research efforts have been made to
design cyber threat intelligence (CTI) systems that extract CTI data from publicly available …
design cyber threat intelligence (CTI) systems that extract CTI data from publicly available …
A framework for threat intelligence extraction and fusion
Cyber-attacks, with various emerging attack techniques, are becoming increasingly
sophisticated and difficult to deal with, posing great threats to companies and every …
sophisticated and difficult to deal with, posing great threats to companies and every …
[HTML][HTML] Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing
Network traffic analysis is an important cybersecurity task, which helps to classify
anomalous, potentially dangerous connections. In many cases, it is critical not only to detect …
anomalous, potentially dangerous connections. In many cases, it is critical not only to detect …
[HTML][HTML] CyberEntRel: Joint extraction of cyber entities and relations using deep learning
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense
strategies for security professionals. These are built from cyber threat intelligence data …
strategies for security professionals. These are built from cyber threat intelligence data …
Advanced Persistent Threat intelligent profiling technique: A survey
BH Tang, JF Wang, Z Yu, B Chen, W Ge, J Yu… - Computers and Electrical …, 2022 - Elsevier
With the boom in Internet and information technology, cyber-attacks are becoming more
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with
detailed threat attack procedures and indicators of compromise (IOCs), eg, malware hash or …
detailed threat attack procedures and indicators of compromise (IOCs), eg, malware hash or …