Advanced Search Results For "cyber security"
Your filters
Blockchain-Based Cyber Threat Intelligence Sharing Using Proof-of-Quality Consensus.
Publication Type: Academic Journal
Source(s): Security & Communication Networks. 2/13/2023, p1-20. 20p.
Abstract: Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is collected, processed, analysed, and disseminated to the right audience, in order to comprehend a malicious threat actor's motivation, goals, objectives, targets, ...
Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks.
Publication Type: Academic Journal
Source(s): Computers, Materials & Continua. 2023, Vol. 74 Issue 1, p235-252. 18p.
Abstract: The continuous improvement of the cyber threat intelligence sharing mechanism provides new ideas to deal with Advanced Persistent Threats (APT). Extracting attack behaviors, i.e., Tactics, Techniques, Procedures (TTP) from Cyber Threat Intelligence (CT...
Intrusion Detection for Cyber-Physical Security System Using Long Short-Term Memory Model.
Publication Type: Academic Journal
Source(s): Scientific Programming. 11/21/2022, Vol. 2022, p1-11. 11p.
Abstract: In the present context, the deep learning approach is highly applicable for identifying cyber-attacks on intrusion detection systems (IDS) in cyber-physical security systems. As a key part of network security defense, cyber-attacks can change and penet...
Comparative Experiment on TTP Classification with Class Imbalance Using Oversampling from CTI Dataset.
Publication Type: Academic Journal
Source(s): Security & Communication Networks. 10/12/2022, p1-11. 11p.
Abstract: Cyber threat intelligence (CTI) refers to the real-time collection of threat information and analysis of these acquired data to identify the situation and attack mechanism of a security threat. In a CTI analysis, it is important to have a standardized ...
SECURITY IN THE BLOCKCHAIN IN HEALTH CARE SECTOR.
Publication Type: Academic Journal
Source(s): Safety & Security Sciences Review. 2022 special issue2, Vol. 4 Issue SE2, p99-108. 10p.
Abstract: Az Egészség 4.0 megjelenésével az egészségügyi ágazat az innováció új korszakába lép. Az adatalapú tanulás és a rendszerek öszszekapcsolhatósága révén az élvonalbeli technológiák, például a kiber-fizikai rendszerek, a big data, a felsÅ‘ alapú számÃtáste...
Detecting ShadowsocksR User Based on Intelligence of Cyber Entities.
Publication Type: Academic Journal
Source(s): Security & Communication Networks. 8/24/2022, p1-10. 10p.
Abstract: ShadowsocksR (SSR), as a typical emerging anonymous communication tool, may record user information on the SSR client or server, leading to the theft of the user's privacy, and may be used by attackers to anonymize their internal network environment an...
An Automatic Assessment Method of Cyber Threat Intelligence Combined with ATT&CK Matrix.
Publication Type: Academic Journal
Source(s): Wireless Communications & Mobile Computing. 8/8/2022, p1-12. 12p.
Abstract: With the occurrence of cyber security incidents, the value of threat intelligence is coming to the fore. Timely extracting Indicator of Compromise (IOC) from cyber threat intelligence can quickly respond to threats. However, the sparse text in public t...
LogKernel: A Threat Hunting Approach Based on Behaviour Provenance Graph and Graph Kernel Clustering.
Publication Type: Academic Journal
Source(s): Security & Communication Networks. 9/27/2022, p1-16. 16p.
Abstract: Cyber threat hunting is a proactive search process for hidden threats in an organization's information system. It is a crucial component of active defense against advanced persistent threats (APTs). However, most of the current threat hunting methods r...
A Reputation-Based Approach Using Consortium Blockchain for Cyber Threat Intelligence Sharing.
Publication Type: Academic Journal
Source(s): Security & Communication Networks. 8/10/2022, p1-20. 20p.
Abstract: The CTI (Cyber Threat Intelligence) sharing and exchange is an effective method to improve the responsiveness of the protection party. Blockchain technology enables sharing collaboration consortium to conduct a trusted CTI sharing and exchange without ...
Design of Threat Response Modeling Language for Attacker Profile Based on Probability Distribution.
Publication Type: Academic Journal
Source(s): Wireless Communications & Mobile Computing. 6/16/2022, p1-16. 16p.
Abstract: Threat modeling and simulation (TMS) was aimed at dynamically capturing the features of attacks, which is a challenging job in complex Industrial Internet of Things (IIoT) control systems due to the complicated relationships among attacks. Recently, Me...