Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 146,675
1.
  • Cyber Threat Intelligence M... Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios; Bromander, Siri 2017 European Intelligence and Security Informatics Conference (EISIC), 09/2017
    Conference Proceeding, Journal Article
    Peer reviewed
    Open access

    Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security ...
Full text
Available for: IJS, NUK, UL, UM

PDF
2.
  • Pattern differentiation and... Pattern differentiation and tuning shift in human sensory cortex underlie long-term threat memory
    You, Yuqi; Novak, Lucas R.; Clancy, Kevin J. ... Current biology, 05/2022, Volume: 32, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    The amygdala-prefrontal-cortex circuit has long occupied the center of the threat system,1 but new evidence has rapidly amassed to implicate threat processing outside this canonical circuit.2–4 ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
3.
  • SCERM—A novel framework for... SCERM—A novel framework for automated management of cyber threat response activities
    Iqbal, Zafar; Anwar, Zahid Future generation computer systems, July 2020, 2020-07-00, Volume: 108
    Journal Article
    Peer reviewed

    Cyber Threat Management (CTM) involves prevention, detection, and response to cyber-attacks by identifying and understanding threats, and applying appropriate actions. This is not practical for an ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
4.
  • Insight Into Insiders and IT Insight Into Insiders and IT
    Homoliak, Ivan; Toffalini, Flavio; Guarnizo, Juan ... ACM computing surveys, 05/2019, Volume: 52, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel ...
Full text
Available for: IZUM, KILJ, NUK, PILJ, SAZU, UL, UM, UPUK

PDF
5.
  • A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr; Pourzandi, Makan; Debbabi, Mourad IEEE Communications surveys and tutorials, 10/2023
    Journal Article
    Peer reviewed

    With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation ...
Full text
Available for: IJS, NUK, UL
6.
  • Advanced Persistent Threat ... Advanced Persistent Threat intelligent profiling technique: A survey
    Tang, BinHui; Wang, JunFeng; Yu, Zhongkun ... Computers & electrical engineering, October 2022, 2022-10-00, Volume: 103
    Journal Article
    Peer reviewed

    With the boom in Internet and information technology, cyber-attacks are becoming more frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike traditional attacks, APT ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
7.
  • A machine learning-based Fi... A machine learning-based FinTech cyber threat attribution framework using high-level indicators of compromise
    Noor, Umara; Anwar, Zahid; Amjad, Tehmina ... Future generation computer systems, July 2019, 2019-07-00, Volume: 96
    Journal Article
    Peer reviewed

    Cyber threat attribution identifies the source of a malicious cyber activity, which in turn informs cyber security mitigation responses and strategies. Such responses and strategies are crucial for ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
8.
  • Perceived threat or perceiv... Perceived threat or perceived benefit? Immigrants’ perception of how Finns tend to perceive them
    Nshom, Elvis; Khalimzoda, Ilkhom; Sadaf, Shomaila ... International journal of intercultural relations, January 2022, 2022-01-00, 20220101, Volume: 86
    Journal Article
    Peer reviewed
    Open access

    Research on how immigrants are perceived by locals has flourished extensively within the past decades. Through the lens of integrated threat theory and the threat benefit model, this study examines ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP

PDF
9.
Full text
Available for: DOBA, IZUM, KILJ, NUK, PILJ, PNG, SAZU, SIK, UILJ, UKNU, UL, UM, UPUK

PDF
10.
  • Threat modeling – A systema... Threat modeling – A systematic literature review
    Xiong, Wenjun; Lagerström, Robert Computers & security, 07/2019, Volume: 84
    Journal Article
    Peer reviewed
    Open access

    Cyber security is attracting worldwide attention. With attacks being more and more common and often successful, no one is spared today. Threat modeling is proposed as a solution for secure ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
hits: 146,675

Load filters