[HTML][HTML] A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments

Y Li, Q Liu - Energy Reports, 2021 - Elsevier
At present, most of the economic, commercial, cultural, social and governmental activities
and interactions of countries, at all levels, including individuals, non-governmental …

A comparative study on cyber threat intelligence: The security incident response perspective

D Schlette, M Caselli, G Pernul - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …

Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution

Y Ren, Y **ao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …

Social media analytics on Russia–Ukraine cyber war with natural language processing: Perspectives and challenges

F Sufi - Information, 2023 - mdpi.com
Utilizing social media data is imperative in comprehending critical insights on the Russia–
Ukraine cyber conflict due to their unparalleled capacity to provide real-time information …

Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption

O Kayode-Ajala - Applied Research in Artificial Intelligence and …, 2023 - researchberg.com
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …

Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text

H Jo, Y Lee, S Shin - Computers & Security, 2022 - Elsevier
To counteract the rapidly evolving cyber threats, many research efforts have been made to
design cyber threat intelligence (CTI) systems that extract CTI data from publicly available …

A framework for threat intelligence extraction and fusion

Y Guo, Z Liu, C Huang, N Wang, H Min, W Guo… - Computers & Security, 2023 - Elsevier
Cyber-attacks, with various emerging attack techniques, are becoming increasingly
sophisticated and difficult to deal with, posing great threats to companies and every …

Recent progress of using knowledge graph for cybersecurity

K Liu, F Wang, Z Ding, S Liang, Z Yu, Y Zhou - Electronics, 2022 - mdpi.com
In today's dynamic complex cyber environments, Cyber Threat Intelligence (CTI) and the risk
of cyberattacks are both increasing. This means that organizations need to have a strong …

Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective

M Asiri, N Saxena, R Gjomemo, P Burnap - ACM transactions on cyber …, 2023 - dl.acm.org
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …

A new social media-driven cyber threat intelligence

F Sufi - Electronics, 2023 - mdpi.com
Cyber threats are projected to cause USD 10.5 trillion in damage to the global economy in
2025. Comprehending the level of threat is core to adjusting cyber posture at the personal …