Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

[HTML][HTML] A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

An improved PIO feature selection algorithm for IoT network intrusion detection system based on ensemble learning

OA Alghanam, W Almobaideen, M Saadeh… - Expert Systems with …, 2023 - Elsevier
With the rapid growth of the number of connected devices that exchange personal, sensitive,
and important data through the IoT based global network, attacks that are targeting security …

The Role of Public Administration in combating cybercrime: An Analysis of the Legal Framework in Indonesia

I Anwary - International Journal of Cyber Criminology, 2022 - cybercrimejournal.com
With the expansion of Internet use and technological innovation, cybercriminals can now
easily violate laws and regulations. Because of this, cybercrime-related issues are swiftly …

An integrated cyber security risk management framework and risk predication for the critical infrastructure protection

HI Kure, S Islam, H Mouratidis - Neural Computing and Applications, 2022 - Springer
Cyber security risk management plays an important role for today's businesses due to the
rapidly changing threat landscape and the existence of evolving sophisticated cyber attacks …

CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters

T Chen, H Zeng, M Lv, T Zhu - Computers & Security, 2024 - Elsevier
Dynamic malware analysis that monitors the sequences of API calls of the program in a
sandbox has been proven to be effective against code obfuscation and unknown malware …

[HTML][HTML] A comparative analysis of cyber-threat intelligence sources, formats and languages

A Ramsdale, S Shiaeles, N Kolokotronis - Electronics, 2020 - mdpi.com
The sharing of cyber-threat intelligence is an essential part of multi-layered tools used to
protect systems and organisations from various threats. Structured standards, such as STIX …

[PDF][PDF] Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption

O Kayode-Ajala - Applied Research in Artificial Intelligence and Cloud …, 2023 - core.ac.uk
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …

[HTML][HTML] Current approaches and future directions for cyber threat intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …