Autonomous threat hunting: A future paradigm for AI-driven threat intelligence

SR Sindiramutty - arxiv preprint arxiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

What changed in the cyber-security after COVID-19?

R Kumar, S Sharma, C Vachhani, N Yadav - Computers & Security, 2022 - Elsevier
This paper examines the transition in the cyber-security discipline induced by the ongoing
COVID-19 pandemic. Using the classical information retrieval techniques, a more than …

Be Aware of Your Text Messages: Fraud Attempts Identification Based on Semantic Sequential Learning for Financial Transactions through Mobile Services in …

SA Khushbu, FT Jaigirdar, A Anwar, O Tuhin - 2024 - researchsquare.com
The growth of mobile financial services over the last decade is well accepted by the people
of Bangladesh. However, although reported here and there, a complete understanding of …

[PDF][PDF] Enabling Public Security Text-Based Analytics: A Survey to Outline Research Directions

VDH De Carvalho, RJR Dos Santos… - 2024 - preprints.org
Text mining is a technological trend often highlighted in the continuous exchange of
information through interconnected media. Its applicability goes beyond private …

[PDF][PDF] CYBER SECURITY RISK ASSESSMENTS, COMPLIANCE AND

IS Nwokoro - … Conference on Technological Solutions for Smart …, 2024 - academia.edu
Study on how managers respond to cyber security breaches has focused on exterior
activities, such as customer service and crisis management. An internal breach inside the …

The Effect of Security Awareness Training, Leadership Commitment, and Usable Security on Security Compliance Intent

JK Adams - 2023 - search.proquest.com
The human component of information systems represents a critical and high-impact target
for cyberattacks. Firms address these threats through various means, including security …

Automatic Generation of Security-Centric Description for Cyber Threats

T Wu - 2021 - figshare.swinburne.edu.au
It is essential to ensure the users comprehend the security information so that they can apply
the advice it contains in practice. However, the security-centric descriptions generated by …