A Survey on the Applications of Semi-supervised Learning to Cyber-security

PK Mvula, P Branco, GV Jourdan, HL Viktor - ACM Computing Surveys, 2024 - dl.acm.org
Machine Learning's widespread application owes to its ability to develop accurate and
scalable models. In cyber-security, where labeled data is scarce, Semi-Supervised Learning …

The roadmap to 6G security and privacy

P Porambage, G Gür, DPM Osorio… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Although the fifth generation (5G) wireless networks are yet to be fully investigated, the
visionaries of the 6th generation (6G) echo systems have already come into the discussion …

A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications

TO Browne, M Abedin, MJM Chowdhury - International Journal of …, 2024 - Springer
This paper presents a systematic review to identify research combining artificial intelligence
(AI) algorithms with Open source intelligence (OSINT) applications and practices. Currently …

6G security challenges and potential solutions

P Porambage, G Gür, DPM Osorio… - 2021 Joint European …, 2021 - ieeexplore.ieee.org
Although the fifth generation wireless networks are yet to be fully investigated, the vision and
key elements of the 6th generation (6G) ecosystem have already come into discussion. In …

[HTML][HTML] Combining sociocultural intelligence with Artificial Intelligence to increase organizational cyber security provision through enhanced resilience

PRJ Trim, YI Lee - Big Data and Cognitive Computing, 2022 - mdpi.com
Although artificial intelligence (AI) and machine learning (ML) can be deployed to improve
cyber security management, not all managers understand the different types of AI/ML and …

Cybert: Contextualized embeddings for the cybersecurity domain

P Ranade, A Piplai, A Joshi… - 2021 IEEE International …, 2021 - ieeexplore.ieee.org
We present CyBERT, a domain-specific Bidirectional Encoder Representations from
Transformers (BERT) model, fine-tuned with a large corpus of textual cybersecurity data …

Impacts and risk of generative AI technology on cyber defense

S Neupane, IA Fernandez, S Mittal… - arxiv preprint arxiv …, 2023 - arxiv.org
Generative Artificial Intelligence (GenAI) has emerged as a powerful technology capable of
autonomously producing highly realistic content in various domains, such as text, images …

Creating cybersecurity knowledge graphs from malware after action reports

A Piplai, S Mittal, A Joshi, T Finin, J Holt, R Zak - IEEE Access, 2020 - ieeexplore.ieee.org
After Action Reports (AARs) provide incisive analysis of cyber-incidents. Extracting cyber-
knowledge from these sources would provide security analysts with credible information …

Generating fake cyber threat intelligence using transformer-based models

P Ranade, A Piplai, S Mittal, A Joshi… - 2021 International Joint …, 2021 - ieeexplore.ieee.org
Cyber-defense systems are being developed to automatically ingest Cyber Threat
Intelligence (CTI) that contains semi-structured data and/or text to populate knowledge …

From European critical infrastructure protection to the resilience of European critical entities: what does it mean?

C Pursiainen, E Kytömaa - Sustainable and Resilient infrastructure, 2023 - Taylor & Francis
The article is a public policy analysis of the development of legislation on critical
infrastructure in the European Union (EU), covering 27 developed countries. More precisely …