Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
[HTML][HTML] Dynamic risk assessment in cybersecurity: A systematic literature review
P Cheimonidis, K Rantos - Future Internet, 2023 - mdpi.com
Traditional information security risk assessment (RA) methodologies and standards,
adopted by information security management systems and frameworks as a foundation …
adopted by information security management systems and frameworks as a foundation …
Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …
A different cup of {TI}? the added value of commercial threat intelligence
X Bouwman, H Griffioen, J Egbers, C Doerr… - 29th USENIX security …, 2020 - usenix.org
Commercial threat intelligence is thought to provide unmatched coverage on attacker
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …
Cyber threat intelligence: A product without a process?
K Oosthoek, C Doerr - International Journal of Intelligence and …, 2021 - Taylor & Francis
Cyber threats have become a permanent threat to society. Over the last few years, accounts
of hacking campaigns into public-and private-sector enterprises have drawn significant …
of hacking campaigns into public-and private-sector enterprises have drawn significant …
Interoperability challenges in the cybersecurity information sharing ecosystem
K Rantos, A Spyros, A Papanikolaou, A Kritsas… - Computers, 2020 - mdpi.com
Threat intelligence helps businesses and organisations make the right decisions in their
fight against cyber threats, and strategically design their digital defences for an optimised …
fight against cyber threats, and strategically design their digital defences for an optimised …
[HTML][HTML] Blockchain-based cyber threat intelligence system architecture for sustainable computing
Nowadays, the designing of cyber-physical systems has a significant role and plays a
substantial part in develo** a sustainable computing ecosystem for secure and scalable …
substantial part in develo** a sustainable computing ecosystem for secure and scalable …
CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …
information security is essentially defined by the maturity of security operations and incident …
Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus
D Chatziamanetoglou, K Rantos - Security and Communication …, 2023 - Wiley Online Library
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is
collected, processed, analysed, and disseminated to the right audience, in order to …
collected, processed, analysed, and disseminated to the right audience, in order to …
OVANA: An approach to analyze and improve the information quality of vulnerability databases
Vulnerability databases are one of the main information sources for IT security experts.
Hence, the quality of their information is of utmost importance for anyone working in this …
Hence, the quality of their information is of utmost importance for anyone working in this …