The threat of offensive ai to organizations

Y Mirsky, A Demontis, J Kotak, R Shankar, D Gelei… - Computers & …, 2023 - Elsevier
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …

The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends

J Pastor-Galindo, P Nespoli, FG Mármol… - IEEE access, 2020 - ieeexplore.ieee.org
The amount of data generated by the current interconnected world is immeasurable, and a
large part of such data is publicly available, which means that it is accessible by any user, at …

Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution

Y Ren, Y Xiao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …

AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports

Z Li, J Zeng, Y Chen, Z Liang - European Symposium on Research in …, 2022 - Springer
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …

DLTIF: Deep learning-driven cyber threat intelligence modeling and identification framework in IoT-enabled maritime transportation systems

P Kumar, GP Gupta, R Tripathi, S Garg… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is
successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the …

A framework for threat intelligence extraction and fusion

Y Guo, Z Liu, C Huang, N Wang, H Min, W Guo… - Computers & Security, 2023 - Elsevier
Cyber-attacks, with various emerging attack techniques, are becoming increasingly
sophisticated and difficult to deal with, posing great threats to companies and every …

Systematic literature review to investigate the application of open source intelligence (osint) with artificial intelligence

JRG Evangelista, RJ Sassi, M Romero… - Journal of Applied …, 2021 - Taylor & Francis
Abstract Open Source Intelligence (OSINT) is a concept to describe the search, collection,
analysis, and use of information from open sources, as well as the techniques and tools …

Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security

A Yadav, A Kumar, V Singh - Artificial Intelligence Review, 2023 - Springer
The volume of data generated by today's digitally connected world is enormous, and a
significant portion of it is publicly available. These data sources are web archives, public …

A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …

B Shin, PB Lowry - Computers & Security, 2020 - Elsevier
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …

A threat hunting framework for industrial control systems

Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …