Cyber threat intelligence mining for proactive cybersecurity defense: a survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
NLP-Based Techniques for Cyber Threat Intelligence
In the digital era, threat actors employ sophisticated techniques for which, often, digital
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …
traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to …
Fine-Tuning Large Language Models for Network Traffic Analysis in Cyber Security
O Lavi, O Manor, T Schwartz, AF Murillo… - … IEEE Conference on …, 2024 - ieeexplore.ieee.org
Language modelling has demonstrated the exceptional interpretation and analysis
capabilities of Large Language Models (LLMs) in addressing a wide range of Natural …
capabilities of Large Language Models (LLMs) in addressing a wide range of Natural …
Computer Network Information Retrieval Algorithm Integrating Data Structure Fusion Optimization
J Guoming - 2024 International Conference on Inventive …, 2024 - ieeexplore.ieee.org
The exponential growth of digital information requires advanced methods for efficient
information retrieval. This paper proposes a novel algorithm that integrates data structure …
information retrieval. This paper proposes a novel algorithm that integrates data structure …
Social Engineering Awareness in ODLS: A Survey on Human Vulnerabilities in Cybersecurity
GF Shehu, FN Ogwueleka - IUP Journal of Information …, 2024 - search.proquest.com
The paper examines social engineering, a technique that capitalizes on human
vulnerabilities tolaunch cybercrimes in open and distance learning (ODL) systems. A survey …
vulnerabilities tolaunch cybercrimes in open and distance learning (ODL) systems. A survey …
RiskRadar: an NLP-driven summarization system for query-based security insights
MS Zilane, MM Rahman, AI Jisa, QA Elma, A Rifat - 2024 - dspace.bracu.ac.bd
The evolving complexity and frequency of cyber threat incidents demand the development of
robust, user-friendly systems that can educate and assist users, and help them understand …
robust, user-friendly systems that can educate and assist users, and help them understand …
DESIGN OF AN IMPROVED MODEL FOR INFORMATION RETRIEVAL USING HIERARCHICAL FCM CLUSTERING AND RERANKING
RD Bhoyar, DN Satange - Machine …, 2024 - machineintelligenceresearchs.com
The need for enhanced information retrieval systems is driven by the exponential growth of
web content, necessitating more accurate and efficient methods to manage and retrieve …
web content, necessitating more accurate and efficient methods to manage and retrieve …