Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

A survey on threat hunting in enterprise networks

B Nour, M Pourzandi, M Debbabi - … communications surveys & …, 2023 - ieeexplore.ieee.org
With the rapidly evolving technological landscape, the huge development of the Internet of
Things, and the embracing of digital transformation, the world is witnessing an explosion in …

CSKG4APT: A cybersecurity knowledge graph for advanced persistent threat organization attribution

Y Ren, Y **ao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

A survey on cybersecurity knowledge graph construction

X Zhao, R Jiang, Y Han, A Li, Z Peng - Computers & Security, 2024 - Elsevier
The development of key technologies of knowledge graph (KG) has promoted the
development of machine cognition technology, and the combination of KG and industry as …

[PDF][PDF] Applications of Cyber Threat Intelligence (CTI) in financial institutions and challenges in its adoption

O Kayode-Ajala - Applied Research in Artificial Intelligence and Cloud …, 2023 - core.ac.uk
The critical nature of financial infrastructures makes them prime targets for cybercriminal
activities, underscoring the need for robust security measures. This research delves into the …

[HTML][HTML] CyberEntRel: Joint extraction of cyber entities and relations using deep learning

K Ahmed, SK Khurshid, S Hina - Computers & Security, 2024 - Elsevier
The cyber threat intelligence (CTI) knowledge graph is beneficial for making robust defense
strategies for security professionals. These are built from cyber threat intelligence data …

Looking beyond IoCs: Automatically extracting attack patterns from external CTI

MT Alam, D Bhusal, Y Park, N Rastogi - Proceedings of the 26th …, 2023 - dl.acm.org
Public and commercial organizations extensively share cyberthreat intelligence (CTI) to
prepare systems to defend against existing and emerging cyberattacks. However, traditional …

Wrongdoing monitor: A graph-based behavioral anomaly detection in cyber security

C Wang, H Zhu - IEEE Transactions on Information Forensics …, 2022 - ieeexplore.ieee.org
The so-called behavioral anomaly detection (BAD) is expected to solve effectively a variety
of security issues by detecting the deviances from normal behavioral patterns of protected …

[HTML][HTML] The role of AI in cyber security: Safeguarding digital identity

M Binhammad, S Alqaydi, A Othman… - Journal of Information …, 2024 - scirp.org
This article signals the use of Artificial Intelligence (AI) in information security where its
merits, downsides as well as unanticipated negative outcomes are noted. It considers AI …