A survey on threat hunting in enterprise networks
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
A bibliometric and multi-disciplinary quasi-systematic analysis of social robots: Past, future, and insights of human-robot interaction
Social robots and their novel applications are slowly emerging to become an indispensable
part of society and businesses. While the field of social robotics has been very …
part of society and businesses. While the field of social robotics has been very …
[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence
E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …
challenging task as attacker uses different obfuscation and deception techniques to hide its …
A systematic review on social robots in public spaces: Threat landscape and attack surface
There is a growing interest in using social robots in public spaces for indoor and outdoor
applications. The threat landscape is an important research area being investigated and …
applications. The threat landscape is an important research area being investigated and …
Offensive security: Cyber threat intelligence enrichment with counterintelligence and counterattack
Cyber-attacks on financial institutions and corporations are on the rise, particularly during
pandemics. These attacks are becoming more sophisticated. Reports of hacking activities …
pandemics. These attacks are becoming more sophisticated. Reports of hacking activities …
Threat intelligence ATT&CK extraction based on the attention transformer hierarchical recurrent neural network
C Liu, J Wang, X Chen - Applied Soft Computing, 2022 - Elsevier
With the rapid growth of cyberattacks in the world wide, Tactics, Techniques & Procedures
(TTPs) has become the most prevalent advanced indicator for a particular attack in …
(TTPs) has become the most prevalent advanced indicator for a particular attack in …
Data breach: analysis, countermeasures and challenges
The increasing use or abuse of online personal data leads to a big data breach challenge
for individuals, businesses, and even the government. Due to the scale of online data and …
for individuals, businesses, and even the government. Due to the scale of online data and …
Comprehensive review on cybersecurity: modern threats and advanced defense strategies
OC Obi, OV Akagha, SO Dawodu, AC Anyanwu… - Computer Science & IT …, 2024 - fepbl.com
In the rapidly evolving landscape of cyberspace, the prevalence of sophisticated cyber
threats has escalated, posing formidable challenges to individuals, organizations, and …
threats has escalated, posing formidable challenges to individuals, organizations, and …
Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …
it remains an area showing silos and reserved for large organizations. For an area whose …