Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
[HTML][HTML] A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience
S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …
business data and system resources. Cyber threat intelligence (CTI) enhances …
[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …
An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning
With the rapid growth of the number of connected devices that exchange personal, sensitive,
and important data through the IoT based global network, attacks that are targeting security …
and important data through the IoT based global network, attacks that are targeting security …
The Role of Public Administration in combating cybercrime: An Analysis of the Legal Framework in Indonesia
I Anwary - International Journal of Cyber Criminology, 2022 - cybercrimejournal.com
With the expansion of Internet use and technological innovation, cybercriminals can now
easily violate laws and regulations. Because of this, cybercrime-related issues are swiftly …
easily violate laws and regulations. Because of this, cybercrime-related issues are swiftly …
An integrated cyber security risk management framework and risk predication for the critical infrastructure protection
Cyber security risk management plays an important role for today's businesses due to the
rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks …
rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks …
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters
T Chen, H Zeng, M Lv, T Zhu - Computers & Security, 2024 - Elsevier
Dynamic malware analysis that monitors the sequences of API calls of the program in a
sandbox has been proven to be effective against code obfuscation and unknown malware …
sandbox has been proven to be effective against code obfuscation and unknown malware …
[HTML][HTML] A comparative analysis of cyber-threat intelligence sources, formats and languages
The sharing of cyber-threat intelligence is an essential part of multi-layered tools used to
protect systems and organisations from various threats. Structured standards, such as STIX …
protect systems and organisations from various threats. Structured standards, such as STIX …
[PDF][PDF] Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption
O Kayode-Ajala - Applied Research in Artificial Intelligence and Cloud …, 2023 - core.ac.uk
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …
activities, underscoring the need for robust security measures. This research delves into the …
[HTML][HTML] Current approaches and future directions for cyber threat intelligence sharing: A survey
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …