Works matching DE "CYBER intelligence (Computer security)"
Results: 577
Editorial on cyber security intelligence and analytics 2023.
- Published in:
- 2025
- By:
- Publication type:
- Editorial
Artificial Intelligence Accelerated Cyber Operations: A Systematic Literature Review.
- Published in:
- Journal of Information Warfare, 2025, v. 24, n. 1, p. 118
- By:
- Publication type:
- Article
A Note from the Editor.
- Published in:
- Journal of Information Warfare, 2025, v. 24, n. 1, p. i
- Publication type:
- Article
Open Source Intelligence, Artificial Intelligence, and Human-centered Approaches to Cyber-security and Countering Disinformation.
- Published in:
- Information & Security, 2024, v. 55, n. 1, p. 7, doi. 10.11610/isij.5500
- By:
- Publication type:
- Article
Assessing Cyber Intelligence, Learning, and Automation Capabilities.
- Published in:
- Journal of Applied Information Science, 2024, v. 12, n. 2, p. 33
- By:
- Publication type:
- Article
Leveraging competitive intelligence in offensive cyber counterintelligence: An operational approach for the shipping industry.
- Published in:
- Security & Defence Quarterly, 2024, v. 48, n. 4, p. 80, doi. 10.35467/sdq/192342
- By:
- Publication type:
- Article
网络威胁技战术情报识别提取生成式技术研究.
- Published in:
- Journal of Frontiers of Computer Science & Technology, 2025, v. 19, n. 1, p. 118, doi. 10.3778/j.issn.1673-9418.2405088
- By:
- Publication type:
- Article
A holistic cyber-physical security protocol for authenticating the provenance and integrity of structural health monitoring imagery data.
- Published in:
- Structural Health Monitoring, 2021, v. 20, n. 4, p. 1657, doi. 10.1177/1475921720927323
- By:
- Publication type:
- Article
Digital Enterprise and Cyber Security Evolution.
- Published in:
- Macromolecular Symposia, 2021, v. 396, n. 1, p. 1, doi. 10.1002/masy.202000326
- By:
- Publication type:
- Article
Advanced Cyber Attack Detection Using Generative Adversarial Networks and NLP.
- Published in:
- Journal of Cybersecurity & Information Management, 2024, v. 14, n. 2, p. 161, doi. 10.54216/JCIM.140211
- By:
- Publication type:
- Article
Deter, Disrupt, or Deceive: Assessing Cyber Conflict as an Intelligence Contest.
- Published in:
- Air & Space Operations Review, 2024, v. 3, n. 2, p. 86
- By:
- Publication type:
- Article
Analyzing the Cyber Threat Information to Consolidate the Security Posture of an Application.
- Published in:
- Journal of Positive School Psychology, 2022, v. 6, n. 2, p. 2783
- By:
- Publication type:
- Article
Cybersecurity Resiliency of Marine Renewable Energy Systems Part 2: Cybersecurity Best Practices and Risk Management.
- Published in:
- Marine Technology Society Journal, 2021, v. 55, n. 2, p. 104, doi. 10.4031/mtsj.55.2.4
- By:
- Publication type:
- Article
Cybersecurity Resiliency of Marine Renewable Energy Systems-Part 1: Identifying Cybersecurity Vulnerabilities and Determining Risk.
- Published in:
- Marine Technology Society Journal, 2020, v. 54, n. 6, p. 97, doi. 10.4031/mtsj.54.6.9
- By:
- Publication type:
- Article
SIFT: Sifting file types—application of explainable artificial intelligence in cyber forensics.
- Published in:
- Cybersecurity (2523-3246), 2024, v. 7, n. 1, p. 1, doi. 10.1186/s42400-024-00241-9
- By:
- Publication type:
- Article
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00110-3
- By:
- Publication type:
- Article
TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network.
- Published in:
- Cybersecurity (2523-3246), 2022, v. 5, n. 1, p. 1, doi. 10.1186/s42400-022-00110-3
- By:
- Publication type:
- Article
Fintech firms and banks sustainability: Why cybersecurity risk matters?
- Published in:
- International Journal of Financial Engineering, 2021, v. 8, n. 2, p. N.PAG, doi. 10.1142/S2424786321500195
- By:
- Publication type:
- Article
Industrial Control Systems: Cyber Policies and Strategies.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 6, p. 48, doi. 10.1002/awwa.1518
- By:
- Publication type:
- Article
Tackle Cybersecurity and AWIA Compliance With AWWA's New Cybersecurity Risk Management Tool.
- Published in:
- Journal: American Water Works Association, 2020, v. 112, n. 3, p. 70, doi. 10.1002/awwa.1466
- By:
- Publication type:
- Article
Cyber offense in NATO: challenges and opportunities.
- Published in:
- International Affairs, 2021, v. 97, n. 3, p. 703, doi. 10.1093/ia/iiab010
- By:
- Publication type:
- Article
Public-private partnerships in national cyber-security strategies.
- Published in:
- International Affairs, 2016, v. 92, n. 1, p. 43, doi. 10.1111/1468-2346.12504
- By:
- Publication type:
- Article
The New South Wales Defence industry strategy and resilience.
- Published in:
- United Service, 2022, v. 73, n. 2, p. 13
- By:
- Publication type:
- Article
Building a Smart Nation: A Nuanced Understanding of Hyper-Connected Singapore.
- Published in:
- International Policy Digest, 2015, v. 2, n. 8, p. 18
- By:
- Publication type:
- Article
A Retrospective Analysis of Maritime Cyber Security Incidents.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2021, v. 15, n. 3, p. 519, doi. 10.12716/1001.15.03.04
- By:
- Publication type:
- Article
Ensuring Cybersecurity in Shipping: Reference to Estonian Shipowners.
- Published in:
- TransNav: International Journal on Marine Navigation & Safety of Sea Transportation, 2020, v. 14, n. 2, p. 271, doi. 10.12716/1001.14.02.01
- By:
- Publication type:
- Article
Integration of Cyber Threat Intelligence into Security Onion and Malcolm for the use case of industrial networks.
- Published in:
- Automatisierungstechnik, 2023, v. 71, n. 9, p. 802, doi. 10.1515/auto-2023-0057
- By:
- Publication type:
- Article
IT-Sicherheit in digitalen Stationen: Cyber-physische Systemmodellierung, -bewertung und -analyse.
- Published in:
- Automatisierungstechnik, 2020, v. 68, n. 9, p. 720, doi. 10.1515/auto-2020-0077
- By:
- Publication type:
- Article
Digitizing Urban Warfare: Infrastructure Insecurity and Cyber Operations in Ukraine, Georgia, and Russia.
- Published in:
- Hemispheres, 2020, v. 43, p. 75
- By:
- Publication type:
- Article
Integrating IS success model with cybersecurity factors for e-government implementation in the Kingdom of Saudi Arabia.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2020, v. 10, n. 5, p. 4937, doi. 10.11591/ijece.v10i5.pp4937-4955
- By:
- Publication type:
- Article
Defense-in-depth Cybersecurity for Smart Substations.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2018, v. 8, n. 6, p. 4423, doi. 10.11591/ijece.v8i6.pp4423-4431
- By:
- Publication type:
- Article
What CPAs Need to Know about Cyber Insurance.
- Published in:
- CPA Journal, 2017, v. 87, n. 3, p. 22
- By:
- Publication type:
- Article
How to Protect Against Common Cyberattacks and Insure Against Potential Losses.
- Published in:
- CPA Journal, 2017, v. 87, n. 3, p. 16
- By:
- Publication type:
- Article
Untitled.
- Published in:
- Public Manager, 2017, p. 1
- Publication type:
- Article
Cyber attacks, self-defence and the problem of attribution.
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 229, doi. 10.1093/jcsl/krs019
- By:
- Publication type:
- Article
Cyber Attacks: Unlawful Uses of Force or Prohibited Interventions?
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 212, doi. 10.1093/jcsl/krs014
- By:
- Publication type:
- Article
Cyber Security without Cyber War.
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 187, doi. 10.1093/jcsl/krs017
- By:
- Publication type:
- Article
Classification of Cyber Conflict.
- Published in:
- Journal of Conflict & Security Law, 2012, v. 17, n. 2, p. 245, doi. 10.1093/jcsl/krs018
- By:
- Publication type:
- Article
A Survey on the Integration of Cyber Threat Feeds and Blockchain Technology.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 5, p. 1357, doi. 10.18280/ijsse.140502
- By:
- Publication type:
- Article
Transforming Cybersecurity: Leveraging Blockchain for Enhanced Threat Intelligence Sharing.
- Published in:
- International Journal of Safety & Security Engineering, 2024, v. 14, n. 4, p. 1139, doi. 10.18280/ijsse.140412
- By:
- Publication type:
- Article
Chinese Cyber Threat Intelligence Named Entity Recognition via RoBERTa-wwm-RDCNN-CRF.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 1, p. 299, doi. 10.32604/cmc.2023.042090
- By:
- Publication type:
- Article
Threat Modeling and Application Research Based on Multi-Source Attack and Defense Knowledge.
- Published in:
- Computers, Materials & Continua, 2023, v. 77, n. 1, p. 349, doi. 10.32604/cmc.2023.040964
- By:
- Publication type:
- Article
Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks.
- Published in:
- Computers, Materials & Continua, 2023, v. 75, n. 1, p. 235, doi. 10.32604/cmc.2023.029135
- By:
- Publication type:
- Article
Attack Behavior Extraction Based on Heterogeneous Cyberthreat Intelligence and Graph Convolutional Networks.
- Published in:
- Computers, Materials & Continua, 2023, v. 74, n. 1, p. 235, doi. 10.32604/cmc.2023.029135
- By:
- Publication type:
- Article
Generic Attribute Scoring for Information Decay in Threat Information Sharing Platform.
- Published in:
- Computers, Materials & Continua, 2021, v. 67, n. 1, p. 917, doi. 10.32604/cmc.2021.014848
- By:
- Publication type:
- Article
Adversarial Active Learning for Named Entity Recognition in Cybersecurity.
- Published in:
- Computers, Materials & Continua, 2021, v. 66, n. 1, p. 407, doi. 10.32604/cmc.2020.012023
- By:
- Publication type:
- Article
AVOIDING A NEW ARMS RACE: WHY MISSILE DEFENSE COOPERATION IS THE BEST ALTERNATIVE TO COMPETITION WITH THE RUSSIAN FEDERATION.
- Published in:
- Review of the Air Force Academy, 2012, v. 20, n. 1, p. 35
- By:
- Publication type:
- Article
Nicotinamide as Independent Variable for Intelligence, Fertility, and Health: Origin of Human Creative Explosions?
- Published in:
- International Journal of Tryptophan Research, 2019, v. 12, p. N.PAG, doi. 10.1177/1178646919855944
- By:
- Publication type:
- Article
Analysis of Human Factors in Cyber Security: A Case Study of Anonymous Attack on Hbgary.
- Published in:
- Computing & Information Systems, 2017, v. 21, n. 2, p. 10
- By:
- Publication type:
- Article
Cyber Security Threats and Vulnerabilities: A Systematic Mapping Study.
- Published in:
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2020, v. 45, n. 4, p. 3171, doi. 10.1007/s13369-019-04319-2
- By:
- Publication type:
- Article