UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

1
hits: 6
1.
  • Cyber Threat Actors for the... Cyber Threat Actors for the Factory of the Future
    Sailio, Mirko; Latvala, Outi-Marja; Szanto, Alexander Applied sciences, 06/2020, Volume: 10, Issue: 12
    Journal Article
    Peer reviewed
    Open access

    The increasing degree of connectivity in factory of the future (FoF) environments, with systems that were never designed for a networked environment in terms of their technical security nature, is ...
Full text

PDF
2.
  • Visualizing Interesting Pat... Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques
    Ejaz, Sarwat; Noor, Umara; Rashid, Zahid Cybernetics and information technologies : CIT, 06/2022, Volume: 22, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    In an advanced and dynamic cyber threat environment, organizations need to yield more proactive methods to handle their cyber defenses. Cyber threat data known as Cyber Threat Intelligence (CTI) of ...
Full text
3.
  • An Exploratory Study on Art... An Exploratory Study on Artifacts for Cyber Attack Attribution Considering False Flag: Using Delphi and AHP Methods
    Hwang, Soonil; Kim, Tae-Sung IEEE access, 2023, Volume: 11
    Journal Article
    Peer reviewed
    Open access

    When a security incident by an attacker occurs in the cyber world, an analyst analyzes the artifacts collected in the incident area. The findings from the analysis of this incident utilize to track ...
Full text
4.
  • Context-aware cyber-threat ... Context-aware cyber-threat attribution based on hybrid features
    Irshad, Ehtsham; Siddiqui, Abdul Basit ICT express, 06/2024, Volume: 10, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution ...
Full text
5.
  • Cyber threat attribution us... Cyber threat attribution using unstructured reports in cyber threat intelligence
    Irshad, Ehtsham; Basit Siddiqui, Abdul Egyptian informatics journal, March 2023, 2023-03-00, 2023-03-01, Volume: 24, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a challenging task as attacker uses different obfuscation and deception techniques to hide its ...
Full text
6.
  • An Association Rule Mining-... An Association Rule Mining-Based Framework for Profiling Regularities in Tactics Techniques and Procedures of Cyber Threat Actors
    Noor, Umara; Anwar, Zahid; Noor, Umara ... 2018 International Conference on Smart Computing and Electronic Enterprise (ICSCEE), 2018-July
    Conference Proceeding

    Tactics Techniques and Procedures (TTPs) in cyber domain is an important threat information that describes the behavior and attack patterns of an adversary. Timely identification of associations ...
Full text
1
hits: 6

Load filters