Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …
[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
[HTML][HTML] Current approaches and future directions for cyber threat intelligence sharing: A survey
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …
Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing
We investigated 12 years DNS query logs of our campus network and identified phenomena
of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are …
of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are …
[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence
E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …
challenging task as attacker uses different obfuscation and deception techniques to hide its …
A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …
[HTML][HTML] Sharing machine learning models as indicators of compromise for cyber threat intelligence
D Preuveneers, W Joosen - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about
cyber attacks to help organizations gain a better understanding of threats and proactively …
cyber attacks to help organizations gain a better understanding of threats and proactively …
A quantitative evaluation of trust in the quality of cyber threat intelligence sources
T Schaberreiter, V Kupfersberger, K Rantos… - Proceedings of the 14th …, 2019 - dl.acm.org
Threat intelligence sharing has become a cornerstone of cooperative and collaborative
cybersecurity. Sources providing such data have become more widespread in recent years …
cybersecurity. Sources providing such data have become more widespread in recent years …
Distributed security framework for reliable threat intelligence sharing
D Preuveneers, W Joosen… - Security and …, 2020 - Wiley Online Library
Computer security incident response teams typically rely on threat intelligence platforms for
information about sightings of cyber threat events and indicators of compromise. Other …
information about sightings of cyber threat events and indicators of compromise. Other …
Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance
The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has
dramatically increased the diversity and complexity of the network. This change diversifies …
dramatically increased the diversity and complexity of the network. This change diversifies …