A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology

M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …

Cloud-based energy management systems: Terminologies, concepts and definitions

JCM Siluk, PS de Carvalho, V Thomasi… - Energy Research & …, 2023 - Elsevier
The evolution of energy systems has placed end users in a central role in dynamic, flexible
and decentralised cloud-based energy management models. Different terms have been …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

TIIA: A blockchain-enabled threat intelligence integrity audit scheme for IIoT

W Zhang, Y Bai, J Feng - Future Generation Computer Systems, 2022 - Elsevier
With the widespread deployment of the Industrial Internet of Things technology (IIoT), the
cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an …

Key requirements for the detection and sharing of behavioral indicators of compromise

A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …

[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data

Z Chang, J Wu, H Liang, Y Wang, Y Wang, X Xiong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …

Actionable cyber threat intelligence for automated incident response

C Leite, J den Hartog, D Ricardo dos Santos… - Nordic Conference on …, 2022 - Springer
Abstract Applying Cyber Threat Intelligence for active cyber defence, while potentially very
beneficial, is currently limited to predominantly manual use. In this paper, we propose an …

Cyberattacks on the accounting profession: a literatur review

D Surya, D Setiawan, YA Aryani… - Media Riset Akuntansi …, 2024 - e-journal.trisakti.ac.id
This research reviews the literature on cyberattacks against accounting information systems,
focusing on their causes, impacts and mitigation strategies. The results of the systematic …

Cyber attacks and faults discrimination in intelligent electronic device-based energy management systems

BMR Amin, MJ Hossain, A Anwar, S Zaman - Electronics, 2021 - mdpi.com
Intelligent electronic devices (IEDs) along with advanced information and communication
technology (ICT)-based networks are emerging in the legacy power grid to obtain real-time …