咨询与建议

限定检索结果

文献类型

  • 3 篇 期刊文献

馆藏范围

  • 3 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 软件工程
    • 1 篇 网络空间安全
  • 1 篇 经济学
    • 1 篇 应用经济学

主题

  • 3 篇 threat intellige...
  • 1 篇 threat landscape
  • 1 篇 regulations
  • 1 篇 threat modeling
  • 1 篇 policy
  • 1 篇 attack surface
  • 1 篇 risk management
  • 1 篇 advanced persist...
  • 1 篇 natural language...
  • 1 篇 compliance
  • 1 篇 cyber-physical s...
  • 1 篇 threat actors
  • 1 篇 artificial intel...
  • 1 篇 security orchest...
  • 1 篇 cyberattacks
  • 1 篇 cyber resilience
  • 1 篇 key risk indicat...
  • 1 篇 privacy
  • 1 篇 intrusion preven...
  • 1 篇 data protection

机构

  • 1 篇 institute of inf...
  • 1 篇 college of infor...
  • 1 篇 beijing electron...
  • 1 篇 department of co...
  • 1 篇 school of cyber ...
  • 1 篇 school of techno...

作者

  • 1 篇 ragha madhavi go...
  • 1 篇 olatunde abiona
  • 1 篇 ning li
  • 1 篇 jun jiang
  • 1 篇 zhengwei jiang
  • 1 篇 aparna gadhi
  • 1 篇 peian yang
  • 1 篇 huamin feng
  • 1 篇 meysam tahmasebi
  • 1 篇 baoxu liu
  • 1 篇 xuren wang
  • 1 篇 yizhe you
  • 1 篇 hitendra chaudha...

语言

  • 3 篇 英文
检索条件"主题词=Threat Intelligence"
3 条 记 录,以下是1-10 订阅
排序:
Beyond Defense: Proactive Approaches to Disaster Recovery and threat intelligence in Modern Enterprises
收藏 引用
Journal of Information Security 2024年 第2期15卷 106-133页
作者: Meysam Tahmasebi School of Technology and Innovation Marymount University Arlington USA
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
TIM: threat context-enhanced TTP intelligence mining on unstructured threat data
收藏 引用
Cybersecurity 2022年 第2期5卷 10-26页
作者: Yizhe You Jun Jiang Zhengwei Jiang Peian Yang Baoxu Liu Huamin Feng Xuren Wang Ning Li Institute of Information Engineering Chinese Academy of SciencesBeijing100093China School of Cyber Security University of Chinese Academy of SciencesBeijing100029China College of Information Engineering Capital Normal UniversityBeijing100048China Beijing Electronic Science and Technology Institute Beijing102627China
TTPs (Tactics, Techniques, and Procedures), which represent an attacker’s goals and methods, are the long period and essential feature of the attacker. Defenders can use TTP intelligence to perform the penetration te... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
Cyber Resilience through Real-Time threat Analysis in Information Security
收藏 引用
International Journal of Communications, Network and System Sciences 2024年 第4期17卷 51-67页
作者: Aparna Gadhi Ragha Madhavi Gondu Hitendra Chaudhary Olatunde Abiona Department of Computer Information Systems Indiana University Northwest Gary IN USA
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论