A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Cybersecurity Becomes Smart Using Artificial Intelligent and Machine Learning Approaches: An Overview
2020
Innovative Computing Information and Control Express Letters, Part B: Applications
Recently, researchers are developing systems based on Artificial Intelligence (AI) and machine learning to create defense approaches and protect data with high level of security and less cost. ...
Moreover, the world is facing Internet of Things devices which generate large volumes of data that cause a lot of new cyber threats. ...
We would like to express our special thanks to Al Zaytoonah University of Jordan for the effort that it provides to us for supporting this research paper. ...
doi:10.24507/icicelb.11.12.1115
fatcat:45af2dgufjcejjmw5kro6yrc5e
Incorporating Cyber Threat Intelligence into Complex Cyber-Physical Systems: A STIX Model for Active Buildings
2022
Applied Sciences
In such a context, security analysis would benefit from collection of cyber threat intelligence (CTI). ...
To facilitate the analysis, we provide a base active building model in STIX in the tool cyberaCTIve that handles complex models. ...
Cyber Threat Intelligence and Active Buildings Threat intelligence is knowledge collected with the purpose of responding to incidents due to malicious adversaries (our focus), hazards, or faults. ...
doi:10.3390/app12105005
fatcat:ovgoyxodrze7tdugohcyl7wzne
Automatic Investigation Framework for Android Malware Cyber-Infrastructures
[article]
2018
arXiv
pre-print
ToGather leverages the state-of-the-art graph theory techniques to generate an actionable and granular intelligence to mitigate the threat imposed by the malicious Internet activity of the Android malware ...
The state-of-the-art malware mitigation solutions mainly focus on the detection of the actual malicious Android apps using dy- namic and static analyses features to distinguish malicious apps from benign ...
1). e authors of the PageRank algorithm considers the use case of web sur ng, where the user starts from a web page and randomly moves to another one through a web link. ...
arXiv:1806.08893v1
fatcat:lpuh6xwvuzgzzdjqja22khfdty
Challenges and Innovations in Cybersecurity
2020
Bioscience Biotechnology Research Communications
When we think about the activities taking place on the web, we are bound to think about all the crimes that happen throughout the web. ...
Billions of people use the internet every day and most of them at the same time. ...
Cloud services like microsoft Azure, Amazon Web services (AWs) and IBm Cloud are adopting Blockchainas-a-service (Baas) which is the third-party cloud-based infrastructure for creating, maintaining and ...
doi:10.21786/bbrc/13.14/53
fatcat:f4w6hwrr5fcrzcfudi7qa5ri7q
Cybersecurity of Critical Infrastructures: Challenges and Solutions
2022
Sensors
Conflicts of Interest: The authors declare no conflict of interest. ...
Unfortunately, the lack of a fully functioning semantic web or text-based solutions to formalize security data sources limits the exploitation of existing cyber intelligence data sources. ...
The widespread use of computers and the Internet, coupled with the threat of activities of cyber criminals, has made it necessary to pay more attention to the detection or improve the technologies behind ...
doi:10.3390/s22145105
pmid:35890784
pmcid:PMC9317681
fatcat:ww5uhdj5y5cbxcdvxezwe37cau
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin
[article]
2022
arXiv
pre-print
The development towards an intelligent, digital, and Internetconnected smart grid has attracted external adversaries for malicious activities. ...
cyber systems, which include device identification, vulnerability discovery, intrusion detection systems (IDSs), honeypots, attribution, and threat intelligence (TI); iv) reviews the relevant content ...
ACKNOWLEDGMENT We appreciate the support of the National Key R&D Program of China under Grants No. 2020YFB1807500, No. 2020YFB1807504, and National Science Foundation of China Key Project under Grants ...
arXiv:2205.11783v1
fatcat:fz43u2e6g5gyfepqz44tezelba
A Review on C3I Systems' Security: Vulnerabilities, Attacks, and Countermeasures
[article]
2022
arXiv
pre-print
Consequently, cyber adversaries leverage highly sophisticated attack vectors to exploit security vulnerabilities in C3I systems. ...
Therefore, C3I systems have become a focal point for cyber adversaries. ...
ACKNOWLEDGMENTS The work has been supported by the Cyber Security Research Centre Limited whose activities are partially funded by the Australian Government's Cooperative Research Centres Programme. ...
arXiv:2104.11906v2
fatcat:nvz3bssy55fwlcwqzkd7n3zism
A Novel Approach to Cyber Hazard Management Intelligence System
2018
International Journal of Engineering & Technology
Our proposed solution elongates forward by using Cyber threat intelligence (CTI) which is used to inform decisions timely regarding subject response to the menance or hazard, where the vulnerable systems ...
to mitigate the cyber threat actions, fortify incident response efforts and enhance your overall security posture. ...
To overcome this, Threat intelligence mainly performs prevent data loss, Incident response, Threat analysis, Data analysis
Overview of Cyber Threat Intelligence (CTI) Threat intelligence often arises ...
doi:10.14419/ijet.v7i2.7.10866
fatcat:cmcxmg3i3nfp7puwzzqocespgy
Big Data in Homeland Security
2015
Journal of Information
It can be used to fight against terrorism and enhance Homeland Security by providing accurate predictions and patterns of terrorist activities. ...
This paper introduces some methods and technologies used in Homeland Security. They are: biometrics, radio frequency identification (RFID), data mining, cloud computing, and Big Data. ...
Active cyber defense has synchronized and real-time capabilities to discover, detect, analyze, and mitigate threats and vulnerability. ...
doi:10.18488/journal.104/2015.1.2/104.2.59.70
fatcat:uzq3ifmznfhabbgsqlcxxcgqla
Handling of advanced persistent threats and complex incidents in healthcare, transportation and energy ICT infrastructures
2020
Evolving Systems
and respond to security threats and risks and and it guides them to handle effectively cyber incidents. ...
The benefits and added value of using CyberSANE is described with the aid of a set of cyber-attack scenarios. ...
IoT connectivity, systems interconnectivity) and computation (e.g. cloud services, use of semitrusted mobile devices) paradigms in IT services, and to identify hidden attack vectors, indirect and subliminal ...
doi:10.1007/s12530-020-09335-4
fatcat:fx76tetjofdkjapu6ymdrabtdq
Threat Defense: Cyber Deception Approach and Education for Resilience in Hybrid Threats Model
2021
Symmetry
This paper aims to explore the cyber-deception-based approach and to design a novel conceptual model of hybrid threats that includes deception methods. ...
Other detection tools use monitoring, traffic, or behavioral analysis. These reactive defenses are designed to detect once they are attacked yet often fail. ...
Introduction The goal of this paper is to construct a novel Hybrid Threats Model and investigate the cyber deception approach for threat detection using deception-based methods. ...
doi:10.3390/sym13040597
fatcat:6thxnfbz4zf7jhi4lnenghqiqq
A Survey on Threat Situation Awareness Systems: Framework, Techniques, and Insights
[article]
2021
arXiv
pre-print
To debilitate these types of threats, a modern and intelligent Cyber Situation Awareness (SA) system need to be developed which has the ability of monitoring and capturing various types of threats, analyzing ...
Cyberspace is full of uncertainty in terms of advanced and sophisticated cyber threats which are equipped with novel approaches to learn the system and propagate themselves, such as AI-powered threats. ...
ACKNOWLEDGEMENT This work was supported by the Cyber Security Research Programme-"Artificial Intelligence for Automating Response to Threats" from the Ministry of Business, Innovation, and Employment ( ...
arXiv:2110.15747v1
fatcat:zboddcg4a5gdxmq5hqmo5cpj34
Competency Pool and the competency model for cyber and information security professionals
2021
Zenodo
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented. ...
Cyber Threat Analysis The cyber security professional is able to identify and assess the capabilities and activities of cyber criminals and/or foreign intelligence agencies using a variety of tools. ...
He is able to draw conclusions regarding the motivations of adversaries based on analysis. ...
doi:10.5281/zenodo.4765645
fatcat:ge7mwxfwpbfk3lifnyoc7aixzq
Competency Pool and the competency model for cyber and information security professionals
2021
Zenodo
The extracted competencies of the competency model analysis and the competency model for cyber and information security professionals are presented. ...
Cyber Threat Analysis The cyber security professional is able to identify and assess the capabilities and activities of cyber criminals and/or foreign intelligence agencies using a variety of tools. ...
He is able to draw conclusions regarding the motivations of adversaries based on analysis. ...
doi:10.5281/zenodo.4765646
fatcat:ok3zjkw2ive2tlrpl3btxqr6l4
U.S. Cyber Threat Intelligence Sharing Frameworks
2016
The international journal of intelligence and counter intelligence
For instance, the intelligence firm Crowdstrike recently found twelve malicious groups in China using the same exploit codes within 24 to 72 hours of each other. 2 In many cases, malicious attempts to ...
Underground hacker markets provide them with ready access to a plethora of products and services. 1 Attackers often rent large botnets or use similar attack tool kits. ...
The use of this intelligence enables an organization to prioritize defenses around prized assets, focusing on vulnerabilities and ways that an adversary activity can be mitigated. 4 Cyber attacks may ...
doi:10.1080/08850607.2016.1230701
fatcat:qrhon63hzzhfpaecl53vsalkbu
« Previous
Showing results 1 — 15 out of 1,658 results