NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

1 2 3 4 5
hits: 140,882
1.
  • Cyber Threat Intelligence M... Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios; Bromander, Siri 2017 European Intelligence and Security Informatics Conference (EISIC), 09/2017
    Conference Proceeding, Journal Article
    Peer reviewed
    Open access

    Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security ...
Full text

PDF
2.
  • Pattern differentiation and... Pattern differentiation and tuning shift in human sensory cortex underlie long-term threat memory
    You, Yuqi; Novak, Lucas R.; Clancy, Kevin J. ... Current biology, 05/2022, Volume: 32, Issue: 9
    Journal Article
    Peer reviewed
    Open access

    The amygdala-prefrontal-cortex circuit has long occupied the center of the threat system,1 but new evidence has rapidly amassed to implicate threat processing outside this canonical circuit.2–4 ...
Full text
3.
  • Cyber threat intelligence s... Cyber threat intelligence sharing: Survey and research directions
    Wagner, Thomas D.; Mahbub, Khaled; Palomar, Esther ... Computers & security, 11/2019, Volume: 87
    Journal Article
    Peer reviewed
    Open access

    Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process of CTI sharing, and even ...
Full text

PDF
4.
  • SCERM—A novel framework for... SCERM—A novel framework for automated management of cyber threat response activities
    Iqbal, Zafar; Anwar, Zahid Future generation computer systems, July 2020, 2020-07-00, Volume: 108
    Journal Article
    Peer reviewed

    Cyber Threat Management (CTM) involves prevention, detection, and response to cyber-attacks by identifying and understanding threats, and applying appropriate actions. This is not practical for an ...
Full text
5.
  • Insight Into Insiders and IT Insight Into Insiders and IT
    Homoliak, Ivan; Toffalini, Flavio; Guarnizo, Juan ... ACM computing surveys, 05/2019, Volume: 52, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel ...
Full text

PDF
6.
  • A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr; Pourzandi, Makan; Debbabi, Mourad IEEE Communications surveys and tutorials, 10/2023
    Journal Article
    Peer reviewed

    With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation ...
Full text
7.
  • Advanced Persistent Threat ... Advanced Persistent Threat intelligent profiling technique: A survey
    Tang, BinHui; Wang, JunFeng; Yu, Zhongkun ... Computers & electrical engineering, October 2022, 2022-10-00, Volume: 103
    Journal Article
    Peer reviewed

    With the boom in Internet and information technology, cyber-attacks are becoming more frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike traditional attacks, APT ...
Full text
8.
  • Perceived threat or perceiv... Perceived threat or perceived benefit? Immigrants’ perception of how Finns tend to perceive them
    Nshom, Elvis; Khalimzoda, Ilkhom; Sadaf, Shomaila ... International journal of intercultural relations, January 2022, 2022-01-00, 20220101, Volume: 86
    Journal Article
    Peer reviewed
    Open access

    Research on how immigrants are perceived by locals has flourished extensively within the past decades. Through the lens of integrated threat theory and the threat benefit model, this study examines ...
Full text

PDF
9.
Full text

PDF
10.
  • Threat modeling – A systema... Threat modeling – A systematic literature review
    Xiong, Wenjun; Lagerström, Robert Computers & security, 07/2019, Volume: 84
    Journal Article
    Peer reviewed
    Open access

    Cyber security is attracting worldwide attention. With attacks being more and more common and often successful, no one is spared today. Threat modeling is proposed as a solution for secure ...
Full text
1 2 3 4 5
hits: 140,882

Load filters