Search

Your search keyword '"Cyber intelligence (Computer security)"' showing total 2,626 results

Search Constraints

Start Over You searched for: Descriptor "Cyber intelligence (Computer security)" Remove constraint Descriptor: "Cyber intelligence (Computer security)"
2,626 results on '"Cyber intelligence (Computer security)"'

Search Results

1. Open hearing : advancing intelligence in the era of artificial intelligence : addressing the national security implications of AI : hearing before the Select Committee on Intelligence of the United States Senate, One Hundred Eighteenth Congress, first session, September 19, 2023.

2. The threat of artificial intelligence in cyber security: Risk and countermeasures.

3. Improving Threat Mitigation Through a Cybersecurity Risk Management Framework: A Computational Design Science Approach.

4. Intelligence Collection Disciplines—A Systematic Review.

5. 网络威胁技战术情报识别提取生成式技术研究.

6. Facets of security and safety problems and paradigms for smart aerial mobility and intelligent logistics.

7. Cyber intelligence and international security: breaking the legal and diplomatic silence?

8. REDUCE Your Risk: BEST PRACTICES TO STRENGTHEN YOUR CYBERSECURITY DEFENSES.

9. A Unified Model for Chinese Cyber Threat Intelligence Flat Entity and Nested Entity Recognition.

10. Application of Generative Artificial Intelligence in Minimizing Cyber Attacks on Vehicular Networks.

11. A Novel Cloud-Enabled Cyber Threat Hunting Platform for Evaluating the Cyber Risks Associated with Smart Health Ecosystems.

12. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system.

13. ENERGY SECURITY IN THE CONTEXT OF CONTEMPORARY GEOPOLITICAL CHALLENGES.

14. Advanced Cyber Attack Detection Using Generative Adversarial Networks and NLP.

15. A Survey on the Integration of Cyber Threat Feeds and Blockchain Technology.

16. OPTIMIZATION OF MANAGEMENT PROCESSES IN CENTRAL GOVERNMENT BODIES THROUGH THE INTEGRATION OF ARTIFICIAL INTELLIGENCE.

17. SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics.

18. An improved transformer‐based model for detecting phishing, spam and ham emails: A large language model approach.

19. AI-Powered Cyber Threats: A Systematic Review.

20. The Impact of Artificial Intelligence on Cyber Security.

21. Securing the Final Frontier: United States Space Force Cybersecurity Capabilities.

22. Modeling Scenarios Combining Cyber Intelligence Procedures, Methods, Technologies and Techniques.

25. Managing risks to the media from emerging networked technologies

26. Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing.

27. When You Think You Are About to Hesitate, Step Forward. Increase Freedom and Trust People in the Field.

28. Swarm-intelligence for the modern ICT ecosystems.

29. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle.

30. Advancing cybersecurity: a comprehensive review of AI-driven detection techniques.

31. VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning.

32. A Survey on Supply Chain Management: Exploring Physical and Cyber Security Challenges, Threats, Critical Applications, and Innovative Technologies.

33. Transforming Cybersecurity: Leveraging Blockchain for Enhanced Threat Intelligence Sharing.

34. An Email Cyber Threat Intelligence Method Using Domain Ontology and Machine Learning.

35. Defending Smart Grid Infrastructure--A Scenario-Based Analysis of Cyber-security and Privacy Rules in China, France, Russia, UK, and USA.

36. Survey on Automated Recognition and Extraction of TTPs.

37. Evaluation of ChatGPT's Configuration Support for Network Connectivity and Security.

38. SMET: Semantic mapping of CTI reports and CVE to ATT&CK for advanced threat intelligence.

39. Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random Numbers and Secure Multiparty Sums.

40. Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack.

41. Mapping Automated Cyber Attack Intelligence to Context-Based Impact on System-Level Goals.

42. Towards an AI-Enhanced Cyber Threat Intelligence Processing Pipeline.

43. Bytes, bombs, and spies : the strategic dimensions of offensive cyber operations.

45. NATO’s New Mission: Keep America in, Russia Down, and China Out.

46. Trusted computing shields military computers from cyber thieves.

48. IPAttributor: Cyber Attacker Attribution with Threat Intelligence-Enriched Intrusion Data.

49. Improvement of Distributed Denial of Service Attack Detection through Machine Learning and Data Processing.

50. Combining Cyber Security Intelligence to Refine Automotive Cyber Threats.

Catalog

Books, media, physical & digital resources