A machine learning approach for the NLP-based analysis of cyber threats and vulnerabilities of the healthcare ecosystem

S Silvestri, S Islam, S Papastergiou, C Tzagkarakis… - Sensors, 2023‏ - mdpi.com
Digitization in healthcare systems, with the wid adoption of Electronic Health Records,
connected medical devices, software and systems providing efficient healthcare service …

Cyber threat assessment and management for securing healthcare ecosystems using natural language processing

S Silvestri, S Islam, D Amelin, G Weiler… - International Journal of …, 2024‏ - Springer
The healthcare sectors have constantly faced significant challenge due to the rapid rise of
cyber threats. These threats can pose any potential risk within the system context and disrupt …

[HTML][HTML] Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review

C Bratsas, EK Anastasiadis, AK Angelidis… - … of Cybersecurity and …, 2024‏ - mdpi.com
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing.
The extracted information can provide security analysts with useful Cyber Threat Intelligence …

[HTML][HTML] A taxonomy for threat actors' delivery techniques

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Applied Sciences, 2022‏ - mdpi.com
The main contribution of this paper is to provide an accurate taxonomy for delivery
techniques, which allows the detection of novel techniques and the identification of …

Cyber threat analysis using natural language processing for a secure healthcare system

S Islam, S Papastergiou… - 2022 IEEE Symposium on …, 2022‏ - ieeexplore.ieee.org
Cyber threats in the healthcare sector have increased significantly in recent years. Attackers
are now using sophisticated techniques to launch multi-phase cyber attacks to compromise …

Cyberattack ontology: A knowledge representation for cyber supply chain security

A Yeboah-Ofori, UM Ismail, T Swidurski… - 2021 International …, 2021‏ - ieeexplore.ieee.org
Cyberattacks on cyber supply chain (CSC) systems and the cascading impacts have brought
many challenges and different threat levels with unpredictable consequences. The …

Building an ontological bridge between supply chain resilience and IoT applications

M Koot, MRK Mes, ME Iacob - International Conference on Enterprise …, 2023‏ - Springer
The complexity of modern-day supply chains makes logistics operations more vulnerable
towards disturbances, which endangers sustainability goals in the short-term. Local …

[PDF][PDF] Integrated threat intelligence platform for security operations in organizations

KU Abinesh Kamal, SV Divya - Automatika: časopis za automatiku …, 2024‏ - hrcak.srce.hr
Organizations have to establish strong security operations to protect their digital assets since
cyberattacks are becoming more prevalent and sophisticated. Integrating threat intelligence …

Cyber threat ontology and adversarial machine learning attacks: analysis and prediction perturbance

A Yeboah-Ofori, UM Ismail, T Swidurski… - 2021 International …, 2021‏ - ieeexplore.ieee.org
Machine learning has been used in the cybersecurity domain to predict cyberattack trends.
However, adversaries can inject malicious data into the dataset during training and testing to …

[HTML][HTML] The diversification and enhancement of an ids scheme for the cybersecurity needs of modern supply chains

D Deyannis, E Papadogiannaki, G Chrysos… - Electronics, 2022‏ - mdpi.com
The Diversification and Enhancement of an IDS Scheme for the Cybersecurity Needs of
Modern Supply Chains Next Article in Journal Monitoring Time-Non-Stable Surfaces Using …