With the increasing use of multi-cloud environments, security profession...
Public and commercial companies extensively share cyber threat intellige...
Trust, privacy, and interpretability have emerged as significant concern...
Today's large-scale algorithmic and automated deployment of decision-mak...
Open Cyber threat intelligence (OpenCTI) information is available in an
...
Deep learning-based classifiers have substantially improved recognition ...
Connected autonomous vehicles (CAVs) are anticipated to have built-in AI...
We present MalONT2.0 – an ontology for malware threat intelligence
<cit....
Insider threat is one of the most pernicious threat vectors to informati...
Cyber threat and attack intelligence information are available in
non-st...
Large amounts of threat intelligence information about mal-ware attacks ...
Malware threat intelligence uncovers deep information about malware, thr...
Existing patient data analytics platforms fail to incorporate informatio...
Modern networked systems are constantly under threat from systemic attac...