A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … Communications Surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

A bibliometric and multi-disciplinary quasi-systematic analysis of social robots: Past, future, and insights of human-robot interaction

SF Wamba, MM Queiroz, L Hamzi - Technological Forecasting and Social …, 2023 - Elsevier
Social robots and their novel applications are slowly emerging to become an indispensable
part of society and businesses. While the field of social robotics has been very …

[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence

E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …

A systematic review on social robots in public spaces: Threat landscape and attack surface

SO Oruma, M Sánchez-Gordón, R Colomo-Palacios… - Computers, 2022 - mdpi.com
There is a growing interest in using social robots in public spaces for indoor and outdoor
applications. The threat landscape is an important research area being investigated and …

Offensive security: Cyber threat intelligence enrichment with counterintelligence and counterattack

MU Rana, O Ellahi, M Alam, JL Webber… - IEEE …, 2022 - ieeexplore.ieee.org
Cyber-attacks on financial institutions and corporations are on the rise, particularly during
pandemics. These attacks are becoming more sophisticated. Reports of hacking activities …

Threat intelligence ATT&CK extraction based on the attention transformer hierarchical recurrent neural network

C Liu, J Wang, X Chen - Applied Soft Computing, 2022 - Elsevier
With the rapid growth of cyberattacks in the world wide, Tactics, Techniques & Procedures
(TTPs) has become the most prevalent advanced indicator for a particular attack in …

Data breach: analysis, countermeasures and challenges

X Zhang, MM Yadollahi, S Dadkhah… - … of Information and …, 2022 - inderscienceonline.com
The increasing use or abuse of online personal data leads to a big data breach challenge
for individuals, businesses, and even the government. Due to the scale of online data and …

Comprehensive review on cybersecurity: modern threats and advanced defense strategies

OC Obi, OV Akagha, SO Dawodu, AC Anyanwu… - Computer Science & IT …, 2024 - fepbl.com
In the rapidly evolving landscape of cyberspace, the prevalence of sophisticated cyber
threats has escalated, posing formidable challenges to individuals, organizations, and …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …