Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
Discovery Learning Research in Mathematics Learning: A Bibliometric Review
Discovery Learning is a learning model that changes learning from teacher-centred learning
to student-centred learning so that students learn actively by discovering themselves …
to student-centred learning so that students learn actively by discovering themselves …
Data-driven cybersecurity incident prediction: A survey
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …
recent years we have witnessed a paradigm shift in understanding and defending against …
Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting
Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might
have compromised an enterprise network for a long time without being discovered. To have …
have compromised an enterprise network for a long time without being discovered. To have …
Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution
Y Ren, Y **ao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
Enabling efficient cyber threat hunting with cyber threat intelligence
Log-based cyber threat hunting has emerged as an important solution to counter
sophisticated attacks. However, existing approaches require non-trivial efforts of manual …
sophisticated attacks. However, existing approaches require non-trivial efforts of manual …
Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources
With the rapid growth of the cyber attacks, sharing of cyber threat intelligence (CTI) becomes
essential to identify and respond to cyber attack in timely and cost-effective manner …
essential to identify and respond to cyber attack in timely and cost-effective manner …
Extractor: Extracting attack behavior from threat reports
The knowledge on attacks contained in Cyber Threat Intelligence (CTI) reports is very
important to effectively identify and quickly respond to cyber threats. However, this …
important to effectively identify and quickly respond to cyber threats. However, this …
AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …
increasingly challenging. To combat these attacks, security practitioners actively summarize …
Towards the detection of inconsistencies in public security vulnerability reports
Public vulnerability databases such as Common Vulnerabilities and Exposures (CVE) and
National Vulnerability Database (NVD) have achieved a great success in promoting …
National Vulnerability Database (NVD) have achieved a great success in promoting …