Alguliyev et al., 2023 - Google Patents
CTI Challenges and Perspectives as a Comprehensive Approach to Cyber ResilienceAlguliyev et al., 2023
View PDF- Document ID
- 7154016624386340954
- Author
- Alguliyev R
- Nabiyev B
- Dashdamirova K
- Publication year
- Publication venue
- 2023 5th International Conference on Problems of Cybernetics and Informatics (PCI)
External Links
Snippet
The significant growth in the number, variety, and sophistication of cyber threats in recent years makes traditional approaches ineffective against new generation cyber threats. More effective mechanisms against cyber threats and attacks require intelligent analysis of the …
- 238000013459 approach 0 title abstract description 19
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Yeboah-Ofori et al. | Cyber threat predictive analytics for improving cyber supply chain security | |
| US11075932B2 (en) | Appliance extension for remote communication with a cyber security appliance | |
| Madhavram et al. | AI-Driven Threat Detection: Leveraging Big Data For Advanced Cybersecurity Compliance | |
| Nagar et al. | Novel approach of intrusion detection classification deeplearning using SVM | |
| Shaffi | Comprehensive digital forensics and risk mitigation strategy for modern enterprises | |
| Xie et al. | Network security defence system based on artificial intelligence and big data technology | |
| Galla et al. | AI-driven threat detection: Leveraging big data for advanced cybersecurity compliance | |
| Rawal et al. | Cybersecurity and identity access management | |
| Sendjaja et al. | Cybersecurity in the digital age: Developing robust strategies to protect against evolving global digital threats and cyber attacks | |
| Seker | Cyber threat intelligence understanding fundamentals | |
| Al-Sanjary et al. | Challenges on digital cyber-security and network forensics: a survey | |
| Alguliyev et al. | CTI Challenges and Perspectives as a Comprehensive Approach to Cyber Resilience | |
| Muhammad et al. | Botnet Detection and Incident Response in Security Operation Center (SOC): A Proposed Framework. | |
| Bhardwaj et al. | Machine Learning and Artificial Intelligence for Detecting Cyber Security Threats in IoT Environmment | |
| Yudhianto | Simple, fast, and accurate cybercrime detection on e-government with elastic stack SIEM | |
| Prabu et al. | An automated intrusion detection and prevention model for enhanced network security and threat assessment | |
| Kant | How Cyber Threat Intelligence (CTI) Ensures Cyber Resilience Using Artificial Intelligence and Machine Learning | |
| Howes et al. | Enabling trustworthy spaces via orchestrated analytical security | |
| Sharko et al. | Artificial Intelligence In Cybersecurity Applications | |
| Song et al. | Insider threat defense strategies: Survey and knowledge integration | |
| De Vries et al. | Towards a roadmap for development of intelligent data analysis based cyber attack detection systems | |
| Brahma et al. | An ontology of cyber security automation | |
| Mir et al. | An Enhanced Implementation of Security Management System (SSMS) using UEBA in Smart Grid based SCADA Systems | |
| Oye et al. | Automated Phishing Detection Using Natural Language Processing (NLP) | |
| Ahmed | Data-driven framework and experimental validation for security monitoring of networked systems |