Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

Llm-tikg: Threat intelligence knowledge graph construction utilizing large language model

Y Hu, F Zou, J Han, X Sun, Y Wang - Computers & Security, 2024 - Elsevier
Open-source threat intelligence is often unstructured and cannot be directly applied to the
next detection and defense. By constructing a knowledge graph through open-source threat …

Graph neural networks for intrusion detection: A survey

T Bilot, N El Madhoun, K Al Agha, A Zouaoui - IEEE Access, 2023 - ieeexplore.ieee.org
Cyberattacks represent an ever-growing threat that has become a real priority for most
organizations. Attackers use sophisticated attack scenarios to deceive defense systems in …

Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text

H Jo, Y Lee, S Shin - Computers & Security, 2022 - Elsevier
To counteract the rapidly evolving cyber threats, many research efforts have been made to
design cyber threat intelligence (CTI) systems that extract CTI data from publicly available …

A framework for threat intelligence extraction and fusion

Y Guo, Z Liu, C Huang, N Wang, H Min, W Guo… - Computers & Security, 2023 - Elsevier
Cyber-attacks, with various emerging attack techniques, are becoming increasingly
sophisticated and difficult to deal with, posing great threats to companies and every …

[HTML][HTML] Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing

F Zola, L Segurola-Gil, JL Bruse, M Galar… - Computers & …, 2022 - Elsevier
Network traffic analysis is an important cybersecurity task, which helps to classify
anomalous, potentially dangerous connections. In many cases, it is critical not only to detect …

[HTML][HTML] CyberEntRel: Joint extraction of cyber entities and relations using deep learning

K Ahmed, SK Khurshid, S Hina - Computers & Security, 2024 - Elsevier
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense
strategies for security professionals. These are built from cyber threat intelligence data …

Advanced Persistent Threat intelligent profiling technique: A survey

BH Tang, JF Wang, Z Yu, B Chen, W Ge, J Yu… - Computers and Electrical …, 2022 - Elsevier
With the boom in Internet and information technology, cyber-attacks are becoming more
frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike …

TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network

J Liu, J Yan, J Jiang, Y He, X Wang, Z Jiang, P Yang… - Cybersecurity, 2022 - Springer
The cybersecurity report provides unstructured actionable cyber threat intelligence (CTI) with
detailed threat attack procedures and indicators of compromise (IOCs), eg, malware hash or …