UNI-MB - logo
UMNIK - logo
 

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov UM. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 56.156
1.
  • Cyber Threat Intelligence M... Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
    Mavroeidis, Vasileios; Bromander, Siri 2017 European Intelligence and Security Informatics Conference (EISIC), 09/2017
    Conference Proceeding, Journal Article
    Recenzirano
    Odprti dostop

    Threat intelligence is the provision of evidence-based knowledge about existing or potential threats. Benefits of threat intelligence include improved efficiency and effectiveness in security ...
Celotno besedilo

PDF
2.
  • Pattern differentiation and... Pattern differentiation and tuning shift in human sensory cortex underlie long-term threat memory
    You, Yuqi; Novak, Lucas R.; Clancy, Kevin J. ... Current biology, 05/2022, Letnik: 32, Številka: 9
    Journal Article
    Recenzirano
    Odprti dostop

    The amygdala-prefrontal-cortex circuit has long occupied the center of the threat system,1 but new evidence has rapidly amassed to implicate threat processing outside this canonical circuit.2–4 ...
Celotno besedilo
3.
  • Cyber threat intelligence s... Cyber threat intelligence sharing: Survey and research directions
    Wagner, Thomas D.; Mahbub, Khaled; Palomar, Esther ... Computers & security, 11/2019, Letnik: 87
    Journal Article
    Recenzirano
    Odprti dostop

    Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process of CTI sharing, and even ...
Celotno besedilo

PDF
4.
  • SCERM—A novel framework for... SCERM—A novel framework for automated management of cyber threat response activities
    Iqbal, Zafar; Anwar, Zahid Future generation computer systems, July 2020, 2020-07-00, Letnik: 108
    Journal Article
    Recenzirano

    Cyber Threat Management (CTM) involves prevention, detection, and response to cyber-attacks by identifying and understanding threats, and applying appropriate actions. This is not practical for an ...
Celotno besedilo
5.
  • Insight Into Insiders and IT Insight Into Insiders and IT
    Homoliak, Ivan; Toffalini, Flavio; Guarnizo, Juan ... ACM computing surveys, 05/2019, Letnik: 52, Številka: 2
    Journal Article
    Recenzirano
    Odprti dostop

    Insider threats are one of today’s most challenging cybersecurity issues that are not well addressed by commonly employed security solutions. In this work, we propose structural taxonomy and novel ...
Celotno besedilo

PDF
6.
  • A Survey on Threat Hunting ... A Survey on Threat Hunting in Enterprise Networks
    Nour, Boubakr; Pourzandi, Makan; Debbabi, Mourad IEEE Communications surveys and tutorials, 10/2023, Letnik: 25, Številka: 4
    Journal Article
    Recenzirano

    With the rapidly evolving technological landscape, the huge development of the Internet of Things, and the embracing of digital transformation, the world is witnessing an explosion in data generation ...
Celotno besedilo
7.
  • Advanced Persistent Threat ... Advanced Persistent Threat intelligent profiling technique: A survey
    Tang, BinHui; Wang, JunFeng; Yu, Zhongkun ... Computers & electrical engineering, October 2022, 2022-10-00, Letnik: 103
    Journal Article
    Recenzirano

    With the boom in Internet and information technology, cyber-attacks are becoming more frequent and sophisticated, especially Advanced Persistent Threat (APT) attacks. Unlike traditional attacks, APT ...
Celotno besedilo
8.
  • Perceived threat or perceiv... Perceived threat or perceived benefit? Immigrants’ perception of how Finns tend to perceive them
    Nshom, Elvis; Khalimzoda, Ilkhom; Sadaf, Shomaila ... International journal of intercultural relations, January 2022, 2022-01-00, 20220101, Letnik: 86
    Journal Article
    Recenzirano
    Odprti dostop

    Research on how immigrants are perceived by locals has flourished extensively within the past decades. Through the lens of integrated threat theory and the threat benefit model, this study examines ...
Celotno besedilo

PDF
9.
Celotno besedilo

PDF
10.
  • Threat modeling – A systema... Threat modeling – A systematic literature review
    Xiong, Wenjun; Lagerström, Robert Computers & security, 07/2019, Letnik: 84
    Journal Article
    Recenzirano
    Odprti dostop

    Cyber security is attracting worldwide attention. With attacks being more and more common and often successful, no one is spared today. Threat modeling is proposed as a solution for secure ...
Celotno besedilo
1 2 3 4 5
zadetkov: 56.156

Nalaganje filtrov