The threat of offensive ai to organizations
AI has provided us with the ability to automate tasks, extract information from vast amounts of
data, and synthesize media that is nearly indistinguishable from the real thing. However …
data, and synthesize media that is nearly indistinguishable from the real thing. However …
The not yet exploited goldmine of OSINT: Opportunities, open challenges and future trends
The amount of data generated by the current interconnected world is immeasurable, and a
large part of such data is publicly available, which means that it is accessible by any user, at …
large part of such data is publicly available, which means that it is accessible by any user, at …
Cskg4apt: A cybersecurity knowledge graph for advanced persistent threat organization attribution
Y Ren, Y Xiao, Y Zhou, Z Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Open-source cyber threat intelligence (OSCTI) is becoming more influential in obtaining
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
current network security information. Most studies on cyber threat intelligence (CTI) focus on …
AttacKG: Constructing technique knowledge graph from cyber threat intelligence reports
Cyber attacks are becoming more sophisticated and diverse, making attack detection
increasingly challenging. To combat these attacks, security practitioners actively summarize …
increasingly challenging. To combat these attacks, security practitioners actively summarize …
DLTIF: Deep learning-driven cyber threat intelligence modeling and identification framework in IoT-enabled maritime transportation systems
The recent burgeoning of Internet of Things (IoT) technologies in the maritime industry is
successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the …
successfully digitalizing Maritime Transportation Systems (MTS). In IoT-enabled MTS, the …
A framework for threat intelligence extraction and fusion
Cyber-attacks, with various emerging attack techniques, are becoming increasingly
sophisticated and difficult to deal with, posing great threats to companies and every …
sophisticated and difficult to deal with, posing great threats to companies and every …
Systematic literature review to investigate the application of open source intelligence (osint) with artificial intelligence
JRG Evangelista, RJ Sassi, M Romero… - Journal of Applied …, 2021 - Taylor & Francis
Abstract Open Source Intelligence (OSINT) is a concept to describe the search, collection,
analysis, and use of information from open sources, as well as the techniques and tools …
analysis, and use of information from open sources, as well as the techniques and tools …
Open-source intelligence: a comprehensive review of the current state, applications and future perspectives in cyber security
The volume of data generated by today's digitally connected world is enormous, and a
significant portion of it is publicly available. These data sources are web archives, public …
significant portion of it is publicly available. These data sources are web archives, public …
A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …
A threat hunting framework for industrial control systems
Z Jadidi, Y Lu - IEEE Access, 2021 - ieeexplore.ieee.org
An Industrial Control System (ICS) adversary often takes different actions to exploit
vulnerabilities, pass the border between Information Technology (IT) and Operational …
vulnerabilities, pass the border between Information Technology (IT) and Operational …