Helphed: Hybrid ensemble learning phishing email detection
P Bountakas, C Xenakis - Journal of network and computer applications, 2023 - Elsevier
Phishing email attack is a dominant cyber-criminal strategy for decades. Despite its
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
longevity, it has evolved during the COVID-19 pandemic, indicating that adversaries exploit …
AIAS: AI-ASsisted cybersecurity platform to defend against adversarial AI attacks
G Petihakis, A Farao, P Bountakas, A Sabazioti… - Proceedings of the 19th …, 2024 - dl.acm.org
The increasing integration of Artificial Intelligence (AI) in critical sectors such as healthcare,
finance, and cybersecurity has simultaneously exposed these systems to unique …
finance, and cybersecurity has simultaneously exposed these systems to unique …
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
INCHAIN: a cyber insurance architecture with smart contracts and self-sovereign identity on top of blockchain
Despite the rapid growth of the cyber insurance market in recent years, insurance
companies in this area face several challenges, such as a lack of data, a shortage of …
companies in this area face several challenges, such as a lack of data, a shortage of …
A Bring Your Own Device security awareness survey among professionals
The increasing prevalence of Bring Your Own Device (BYOD) practices in the workplace has
posed significant challenges to organizations in terms of security and management. This …
posed significant challenges to organizations in terms of security and management. This …
Event-Based Threat Intelligence Ontology Model
P Wang, G Dai, L Zhai - International Conference on Science of Cyber …, 2023 - Springer
Abstract Cyber Threat Intelligence (CTI) has become an essential part of contemporary
threat detection and response solutions. However, threat intelligence is facing challenges …
threat detection and response solutions. However, threat intelligence is facing challenges …
NITRO: an Interconnected 5G-IoT Cyber Range
This paper presents NITRO cyber range, which aims at creating a specialized cybersecurity
testing and training environment for 5G and IoT networks. NITRO provides a platform for …
testing and training environment for 5G and IoT networks. NITRO provides a platform for …
Advanced cyber security solutions for critical infrastructure and applications: smart grid and cyber insurance
A Farao - 2024 - dione.lib.unipi.gr
The rapid digitization of critical infrastructure, coupled with the increasing sophistication of
cyber threats, has elevated the importance of robust cybersecurity measures. This …
cyber threats, has elevated the importance of robust cybersecurity measures. This …
Analytical study for cyber threat intelligence (CTI)
IR Alkhateeb, QA Al-Haija, S Abu-Soud - 2023 - IET
Cyber Threat Intelligence (CTI) involves collecting and analyzing cyber security data using
advanced algorithms and rigorous techniques to identify and address potential threats …
advanced algorithms and rigorous techniques to identify and address potential threats …
[PDF][PDF] Cybersecurity Challenges and Pitfalls in 6G Networks
The transition from 5G to 6G networks aims to improve connection speeds and intelligence
levels. 6G is expected to support machine-type communications and ultra-reliable …
levels. 6G is expected to support machine-type communications and ultra-reliable …