A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience
S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …
business data and system resources. Cyber threat intelligence (CTI) enhances …
[PDF][PDF] A game theory method to cyber-threat information sharing in cloud computing technology
M Amini, Z Bozorgasl - International Journal of Information System …, 2023 - papers.ssrn.com
Cybersecurity is a top priority in industry, academia, and government, and information
sharing about cyber-threats between different organizations has the potential to maximize …
sharing about cyber-threats between different organizations has the potential to maximize …
Cloud-based energy management systems: Terminologies, concepts and definitions
JCM Siluk, PS de Carvalho, V Thomasi… - Energy Research & …, 2023 - Elsevier
The evolution of energy systems has placed end users in a central role in dynamic, flexible
and decentralised cloud-based energy management models. Different terms have been …
and decentralised cloud-based energy management models. Different terms have been …
[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …
TIIA: A blockchain-enabled threat intelligence integrity audit scheme for IIoT
W Zhang, Y Bai, J Feng - Future Generation Computer Systems, 2022 - Elsevier
With the widespread deployment of the Industrial Internet of Things technology (IIoT), the
cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an …
cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an …
Key requirements for the detection and sharing of behavioral indicators of compromise
A Villalón-Huerta, I Ripoll-Ripoll, H Marco-Gisbert - Electronics, 2022 - mdpi.com
Cyber threat intelligence feeds the focus on atomic and computed indicators of compromise.
These indicators are the main source of tactical cyber intelligence most organizations benefit …
These indicators are the main source of tactical cyber intelligence most organizations benefit …
[HTML][HTML] A review of Power System False data attack Detection Technology based on Big data
Z Chang, J Wu, H Liang, Y Wang, Y Wang, X Xiong - Information, 2024 - mdpi.com
As power big data plays an increasingly important role in the operation, maintenance, and
management of power systems, complex and covert false data attacks pose a serious threat …
management of power systems, complex and covert false data attacks pose a serious threat …
Actionable cyber threat intelligence for automated incident response
Abstract Applying Cyber Threat Intelligence for active cyber defence, while potentially very
beneficial, is currently limited to predominantly manual use. In this paper, we propose an …
beneficial, is currently limited to predominantly manual use. In this paper, we propose an …
Cyberattacks on the accounting profession: a literatur review
This research reviews the literature on cyberattacks against accounting information systems,
focusing on their causes, impacts and mitigation strategies. The results of the systematic …
focusing on their causes, impacts and mitigation strategies. The results of the systematic …
Cyber attacks and faults discrimination in intelligent electronic device-based energy management systems
Intelligent electronic devices (IEDs) along with advanced information and communication
technology (ICT)-based networks are emerging in the legacy power grid to obtain real-time …
technology (ICT)-based networks are emerging in the legacy power grid to obtain real-time …