Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …
security defenses to protect against them. The dynamic nature of new-generation threats …
A survey on threat hunting in enterprise networks
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
Things, and the embracing of digital transformation, the world is witnessing an explosion in …
CSKG4APT: A cybersecurity knowledge graph for advanced persistent threat organization attribution
Y Ren, Y **ao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
A survey on cybersecurity knowledge graph construction
X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …
development of machine cognition technology, and the combination of KG and industry as …
[PDF][PDF] Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption
O Kayode-Ajala - Applied Research in Artificial Intelligence and Cloud …, 2023 - core.ac.uk
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …
activities, underscoring the need for robust security measures. This research delves into the …
[HTML][HTML] CyberEntRel: Joint extraction of cyber entities and relations using deep learning
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense
strategies for security professionals. These are built from cyber threat intelligence data …
strategies for security professionals. These are built from cyber threat intelligence data …
Looking beyond IoCs: Automatically extracting attack patterns from external CTI
Public and commercial organizations extensively share cyberthreat intelligence (CTI) to
prepare systems to defend against existing and emerging cyberattacks. However, traditional …
prepare systems to defend against existing and emerging cyberattacks. However, traditional …
Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security
The so-called behavioral anomaly detection (BAD) is expected to solve effectively a variety
of security issues by detecting the deviances from normal behavioral patterns of protected …
of security issues by detecting the deviances from normal behavioral patterns of protected …
[HTML][HTML] The role of AI in cyber security: Safeguarding digital identity
M Binhammad, S Alqaydi, A Othman… - Journal of Information …, 2024 - scirp.org
This article signals the use of Artificial Intelligence (AI) in information security where its
merits, downsides as well as unanticipated negative outcomes are noted. It considers AI …
merits, downsides as well as unanticipated negative outcomes are noted. It considers AI …