Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

Discovery Learning Research in Mathematics Learning: A Bibliometric Review

I Muhammad, R Darmayanti, VR Arif… - Delta-Phi: Jurnal …, 2023 - journal.assyfa.com
Discovery Learning is a learning model that changes learning from teacher-centred learning
to student-centred learning so that students learn actively by discovering themselves …

Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

Poirot: Aligning attack behavior with kernel audit records for cyber threat hunting

SM Milajerdi, B Eshete, R Gjomemo… - Proceedings of the …, 2019 - dl.acm.org
Cyber threat intelligence (CTI) is being used to search for indicators of attacks that might
have compromised an enterprise network for a long time without being discovered. To have …

Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution

Y Ren, Y **ao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …

Enabling efficient cyber threat hunting with cyber threat intelligence

P Gao, F Shao, X Liu, X **ao, Z Qin, F Xu… - 2021 IEEE 37th …, 2021 - ieeexplore.ieee.org
Log-based cyber threat hunting has emerged as an important solution to counter
sophisticated attacks. However, existing approaches require non-trivial efforts of manual …

Ttpdrill: Automatic and accurate extraction of threat actions from unstructured text of cti sources

G Husari, E Al-Shaer, M Ahmed, B Chu… - Proceedings of the 33rd …, 2017 - dl.acm.org
With the rapid growth of the cyber attacks, sharing of cyber threat intelligence (CTI) becomes
essential to identify and respond to cyber attack in timely and cost-effective manner …

Extractor: Extracting attack behavior from threat reports

K Satvat, R Gjomemo… - 2021 IEEE European …, 2021 - ieeexplore.ieee.org
The knowledge on attacks contained in Cyber Threat Intelligence (CTI) reports is very
important to effectively identify and quickly respond to cyber threats. However, this …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

Towards the detection of inconsistencies in public security vulnerability reports

Y Dong, W Guo, Y Chen, X **ng, Y Zhang… - 28th USENIX security …, 2019 - usenix.org
Public vulnerability databases such as Common Vulnerabilities and Exposures (CVE) and
National Vulnerability Database (NVD) have achieved a great success in promoting …