[HTML][HTML] Threat hunting architecture using a machine learning approach for critical infrastructures protection
M Aragonés Lozano, I Pérez Llopis… - Big data and cognitive …, 2023 - mdpi.com
The number and the diversity in nature of daily cyber-attacks have increased in the last few
years, and trends show that both will grow exponentially in the near future. Critical …
years, and trends show that both will grow exponentially in the near future. Critical …
[HTML][HTML] Threat hunting system for protecting critical infrastructures using a machine learning approach
M Aragonés Lozano, I Pérez Llopis, M Esteve Domingo - Mathematics, 2023 - mdpi.com
Cyberattacks are increasing in number and diversity in nature daily, and the tendency for
them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) …
them is to escalate dramatically in the forseeable future, with critical infrastructures (CI) …
A Machine Learning-Driven Threat Hunting Architecture for Protecting Critical Infrastructures
MA Lozano, IP Llopis, AC Alarcón… - … Conference on the …, 2023 - ieeexplore.ieee.org
The number and the diversity in nature of daily cyber-attacks increased last few years, and
trends are that both will grow exponentially in the near future, therefore, Critical …
trends are that both will grow exponentially in the near future, therefore, Critical …
Turning the Hunted into the Hunter via Threat Hunting: Life Cycle, Ecosystem, Challenges and the Great Promise of AI
C Hillier, T Karroubi - arXiv preprint arXiv:2204.11076, 2022 - arxiv.org
The threat hunting lifecycle is a complex atmosphere that requires special attention from
professionals to maintain security. This paper is a collection of recent work that gives a …
professionals to maintain security. This paper is a collection of recent work that gives a …
Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System
Abstract Security and Information Event Management (SIEM) systems require significant
manual input; SIEM tools with machine learning minimizes this effort but are reactive and …
manual input; SIEM tools with machine learning minimizes this effort but are reactive and …
Threat Hunting basado en técnicas de Inteligencia Artificial
M Aragonés Lozano - 2024 - riunet.upv.es
[ES] Tanto la cantidad como la tipología de los ciberataques va en aumento día a día y la
tendencia es que continúen creciendo de forma exponencial en los próximos años. Estos …
tendencia es que continúen creciendo de forma exponencial en los próximos años. Estos …