NLP-Based Techniques for Cyber Threat Intelligence

M Arazzi, DR Arikkat, S Nicolazzo, A Nocera… - arxiv preprint arxiv …, 2023‏ - arxiv.org
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …

Orchestrating collaborative cybersecurity: a secure framework for distributed privacy-preserving threat intelligence sharing

JR Trocoso-Pastoriza, A Mermoud, R Bouyé… - arxiv preprint arxiv …, 2022‏ - arxiv.org
Cyber Threat Intelligence (CTI) sharing is an important activity to reduce information
asymmetries between attackers and defenders. However, this activity presents challenges …

Computational diplomacy: how 'hackathons for good'feed a participatory future for multilateralism in the digital age

T Maillart, L Gomez, E Lombard… - Philosophical …, 2024‏ - royalsocietypublishing.org
This article explores the role of hackathons for good in building a community of software and
hardware developers focused on addressing global sustainable development goal (SDG) …

[HTML][HTML] SeCTIS: A framework to Secure CTI Sharing

DR Arikkat, M Cihangiroglu, M Conti, RR KA… - Future Generation …, 2025‏ - Elsevier
The rise of IT-dependent operations in modern organizations has heightened their
vulnerability to cyberattacks. Organizations are inadvertently enlarging their vulnerability to …

Analysis of Institutional Design of European Union Cyber Incident and Crisis Management as a Complex Public Good

M Kianpour, C Frantz - Regulation & Governance, 2024‏ - Wiley Online Library
Effective cyber incident response and crisis management increasingly relies on the
coordination of relevant actors at supranational levels. A polycentric governance structure is …

Building collaborative cybersecurity for critical infrastructure protection: Empirical evidence of collective intelligence information sharing dynamics on threatfox

E Jollès, S Gillard, D Percia David… - … Conference on Critical …, 2022‏ - Springer
This article describes three collective intelligence dynamics observed on ThreatFox, a free
platform operated by abuse. ch that collects and shares indicators of compromise. These …

Understanding enterprise cybersecurity information sharing: a theoretical model and empirical analysis

JZ Zhang, L Goel, S Williamson - Enterprise Information Systems, 2024‏ - Taylor & Francis
This research employs an analytical modelling approach, complemented by empirical
analysis, to delve into enterprise cybersecurity information sharing strategies. Utilising a …

A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds

JH Al-Yasiri, MFB Zolkipli, NFNM Farid… - 2024 7th …, 2024‏ - ieeexplore.ieee.org
In response to the escalating cyber threats, the efficiency of Cyber Threat Intelligence (CTI)
data collection has become paramount in ensuring robust cybersecurity. However, existing …

OPTIMASI DETEKSI MALWARE PADA SIEM WAZUH MELALUI INTEGRASI CYBER THREAT INTELLIGENCE DENGAN MISP DAN DFIR-IRIS

MRT Hidayat, N Widiyasono… - Jurnal Informatika dan …, 2025‏ - journal.eng.unila.ac.id
Ancaman siber terus meningkat seiring kemajuan teknologi informasi, dengan malware
sebagai salah satu bentuk ancaman utama yang mengeksploitasi celah keamanan. Security …

Enhancing Intrusion Detection Systems with Adaptive Learning Techniques

NZ Rizqullah, J Alekhine, DL Yonia… - 2024 IEEE …, 2024‏ - ieeexplore.ieee.org
The importance of adaptive and deep learning in cybersecurity aims to advocate for various
techniques to combat the constantly evolving cyber threats effectively. Those techniques …