Journal articles on the topic 'Cyber Threat Analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Cyber Threat Analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Eltayeb, Omer Eltayeb Omer. "Cyber Defense Using Cyber Threat Intelligence to Anticipate and Avoid Future Cyber Attacks." Journal of Ecohumanism 3, no. 4 (2024): 2435–55. http://dx.doi.org/10.62754/joe.v3i4.3766.
Full textZbigniew, Ciekanowski, and Żurawski Sławomir. "Cyber Threat Analysis (CTA) in Current Conflicts." IgMin Research 2, no. 4 (2024): 224–27. http://dx.doi.org/10.61927/igmin169.
Full textJanoti, Nikhlesh Singh, Rohan, Rida, and Neerja Negi. "Strategic Perspectives on Cyber Threat Intelligence: A Comprehensive Analysis." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (2024): 524–29. http://dx.doi.org/10.22214/ijraset.2024.59816.
Full textРАNСНENKO, O. "Current issues of cyber threat risk assessment: analysis of foreign experience." INFORMATION AND LAW, no. 4(39) (December 9, 2021): 106–12. http://dx.doi.org/10.37750/2616-6798.2021.4(39).248824.
Full textSimola, Jussi, Jouni Pöyhönen, and Lehto Martti. "Cyber Threat Analysis in Smart Terminal Systems." International Conference on Cyber Warfare and Security 18, no. 1 (2023): 369–78. http://dx.doi.org/10.34190/iccws.18.1.931.
Full textDr.Vijayalakshmi Chintamaneni, Dr.M.SreeRamu, Penubala Nagarjuna, PraswikaMeekala, and Pentamaraju Sumegha. "Unmasking Cyber Adversaries: LeveragingCyber Threat Intelligence for AttackerBehavior Analysis." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 27–36. https://doi.org/10.46647/ijetms.2025.v09si01.004.
Full textKhan, Muhammad Salman, Rene Richard, Heather Molyneaux, et al. "Cyber Threat Hunting." International Journal of Cognitive Informatics and Natural Intelligence 15, no. 4 (2021): 1–23. http://dx.doi.org/10.4018/ijcini.20211001.oa9.
Full textEjaz, Sarwat, Umara Noor, and Zahid Rashid. "Visualizing Interesting Patterns in Cyber Threat Intelligence Using Machine Learning Techniques." Cybernetics and Information Technologies 22, no. 2 (2022): 96–113. http://dx.doi.org/10.2478/cait-2022-0019.
Full textEltayeb, Omer Eltayeb Omer. "The Crucial Significance of Cyber Threat Intelligence in Mitigating Cyber Attacks." Journal of Ecohumanism 3, no. 4 (2024): 2422–34. http://dx.doi.org/10.62754/joe.v3i4.3767.
Full textREDDY, PERLA MAHESH, and SMT. M. VANI. "Cyber Threat Intelligence Analysis for Proactive Cybersecurity Defense: A Survey and New Perspectives." Journal of Engineering Sciences 16, no. 04 (2025): 107–13. https://doi.org/10.36893/jes.2025.v16i04.018.
Full textJ. Manasa Krishna and B.S.Mounika Yadav. "Cyber Threat Data Collection and Threat Analysis: Building a Foundation for Proactive Cybersecurity." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 152–55. https://doi.org/10.46647/ijetms.2025.v09si01.024.
Full textJenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.
Full textCandra, Ahmad, Suhardi Suhardi, and Pratama Dahlian Persadha. "INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 7, no. 3 (2021): 441. http://dx.doi.org/10.33172/jp.v7i3.1424.
Full textDr. Rajitha Kotoju and Md. Abrar Khan. "Cognitive Cyber Threat Intelligence: AI-Driven Behavioural Profiling for Proactive Security." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 156–59. https://doi.org/10.46647/10.46647/ijetms.2025.v09si01.025.
Full textSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13253288.
Full textSri, Kanth Mandru. "Explainable AI for Endpoint Security Threat Analysis." European Journal of Advances in Engineering and Technology 11, no. 1 (2024): 56–63. https://doi.org/10.5281/zenodo.13325168.
Full textIlvonen, Ilona, and Pasi Virtanen. "Preparing for Cyber Threats with Information Security Policies." International Journal of Cyber Warfare and Terrorism 3, no. 4 (2013): 22–31. http://dx.doi.org/10.4018/ijcwt.2013100103.
Full textDr., Arjun Singh Chauhan. "MODERN CYBER REGULATIONS AND TECH CRIMES IN THE 21ST CENTURY." Indian Journal of Law and Society I, no. 8 (2024): 39–53. https://doi.org/10.5281/zenodo.10644551.
Full textБаджаж, Эмей. "CYBER WARFARE - A POTENTIAL GLOBAL THREAT." Rule-of-law state: theory and practice 16, no. 4-1 (2020): 178–84. http://dx.doi.org/10.33184/pravgos-2020.4.17.
Full textShelke, Palvi, and Timo Hamalainen. "Analysing Multidimensional Strategies for Cyber Threat Detection in Security Monitoring." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 780–87. http://dx.doi.org/10.34190/eccws.23.1.2123.
Full textShah, Anki, J. Kathyayani, D. Janani, E. Abhinav, and Rajashree Sutrawe. "CYBER THREAT DETECTION AND PROFILING USING AI." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–6. https://doi.org/10.55041/ijsrem.ncft025.
Full textRamsdale, Andrew, Stavros Shiaeles, and Nicholas Kolokotronis. "A Comparative Analysis of Cyber-Threat Intelligence Sources, Formats and Languages." Electronics 9, no. 5 (2020): 824. http://dx.doi.org/10.3390/electronics9050824.
Full textSaidu, I. R., T. Suleiman, and U. E. Akpan. "THE CHALLENGES OF SECURITY THREAT IN NIGERIA CYBERSPACE." FUDMA JOURNAL OF SCIENCES 5, no. 1 (2021): 193–201. http://dx.doi.org/10.33003/fjs-2021-0501-554.
Full textB.S.Mounika Yadav, Komali Guthikonda, and Venu Matta. "Cybersecurity Threat Analysis and Behaviour Analysis: A Comprehensive Approach to Proactive Défense." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 67–70. https://doi.org/10.46647/ijetms.2025.v09si01.010.
Full textIvanov, Andrei V., Ivan V. Nikroshkin, Igor A. Ognev, and Maksim A. Kiselev. "Application of the Blue Team expertise tools in the process of monitoring information systems on the example of the TI platform (Threat Intelligence)." Digital technology security, no. 2 (June 28, 2023): 34–51. http://dx.doi.org/10.17212/2782-2230-2023-2-34-51.
Full textBeladiya, Vandan, and Mihir Sontakke. "Cyber Security SOC Analyst." International Journal for Research in Applied Science and Engineering Technology 13, no. 3 (2025): 2409–12. https://doi.org/10.22214/ijraset.2025.67835.
Full textAlmutairi, Laila. "Deep Learning based Frameworks for Real-time Cyber Threat Analysis." Journal of Engineering and Applied Sciences 10, no. 2 (2023): 119. http://dx.doi.org/10.5455/jeas.2023110109.
Full textDemirol, Doygun, Resul Das, and Davut Hanbay. "A Novel Approach for Cyber Threat Analysis Systems Using BERT Model from Cyber Threat Intelligence Data." Symmetry 17, no. 4 (2025): 587. https://doi.org/10.3390/sym17040587.
Full textNdukwe, Eke Roberts, and Barilee Baridam. "A Graphical and Qualitative Review of Literature on AI-based Cyber-Threat Intelligence (CTI) in Banking Sector." European Journal of Engineering and Technology Research 8, no. 5 (2023): 59–69. http://dx.doi.org/10.24018/ejeng.2023.8.5.3103.
Full textNaidoo, Rennie, and Carla Jacobs. "Cyber Warfare and Cyber Terrorism Threats Targeting Critical Infrastructure: A HCPS-based Threat Modelling Intelligence Framework." European Conference on Cyber Warfare and Security 22, no. 1 (2023): 311–18. http://dx.doi.org/10.34190/eccws.22.1.1443.
Full textTonny, Sumarno, and Risman Helda. "The Universal War Strategy in the 5th Generation War in the 4.0 Industry Era (Cyber Threat Case Study)." Journal of Social and Political Sciences 3, no. 4 (2020): 1111–19. https://doi.org/10.31014/aior.1991.03.04.242.
Full textKumar, Shreyas, and Gourav Nagar. "Threat Modeling for Cyber Warfare Against Less Cyber-Dependent Adversaries." European Conference on Cyber Warfare and Security 23, no. 1 (2024): 257–64. http://dx.doi.org/10.34190/eccws.23.1.2462.
Full textMuhsen, Hani, Adib Allahham, Moath Qandil, Asma Alkhraibat, Ahmad Almomani, and Ala’aldeen Al-Halhouli. "Threat Analysis of Power System Case Study via STRIDE Threat Model in Digital Twin Real-time Platform." EPJ Web of Conferences 330 (2025): 03010. https://doi.org/10.1051/epjconf/202533003010.
Full textAbdullateef Barakat. "AI-driven threat intelligence: Strengthening cyber defense mechanisms in international cybersecurity frameworks." International Journal of Science and Research Archive 14, no. 3 (2025): 598–615. https://doi.org/10.30574/ijsra.2025.14.3.0722.
Full textFalasi, Dr Mariam Al, and Dr Tao Zhang. "AUGMENTING SIEM WITH THREAT INTELLIGENCE FOR PREDICTIVE CYBER DEFENSE: A PROACTIVE THREAT HUNTING APPROACH." International Journal of Cyber Threat Intelligence and Secure Networking 2, no. 03 (2025): 1–5. https://doi.org/10.55640/ijctisn-v02i03-01.
Full textRanjan, Banerjee, Mukherjee Debmalya, Shankar Nayak Partha, Nath Shuvrajit, and Mahabuba Islam Most. "Unweaving the Cyber Attack - The Cyber Kill Chain Analysis." International Journal of Contemporary Research in Multidisciplinary 3, no. 3 (2024): 114–16. https://doi.org/10.5281/zenodo.12179781.
Full textShcherbakova, N. V. "ISSUES OF INFORMATION SECURITY OF SOCIETY UNDER THE CONDITIONS OF THE DEVELOPMENT OF DIGITAL ECONOMY." Vestnik NSUEM, no. 1 (April 1, 2021): 245–53. http://dx.doi.org/10.34020/2073-6495-2021-1-245-253.
Full textChoi, Jun Ho. "Cyber Threat Analysis Using CTI Knowledge Graph and RAG Model." Korean Institute of Smart Media 14, no. 4 (2025): 67–78. https://doi.org/10.30693/smj.2025.14.4.67.
Full textCaramancion, Kevin Matthe, Yueqi Li, Elisabeth Dubois, and Ellie Seoe Jung. "The Missing Case of Disinformation from the Cybersecurity Risk Continuum: A Comparative Assessment of Disinformation with Other Cyber Threats." Data 7, no. 4 (2022): 49. http://dx.doi.org/10.3390/data7040049.
Full textMichael Oladipo Akinsanya, Cynthia Chizoba Ekechi, and Chukwuekem David Okeke. "THE EVOLUTION OF CYBER RESILIENCE FRAMEWORKS IN NETWORK SECURITY: A CONCEPTUAL ANALYSIS." Computer Science & IT Research Journal 5, no. 4 (2024): 926–49. http://dx.doi.org/10.51594/csitrj.v5i4.1081.
Full textPavlík, Lukáš, Martin Ficek, and Jakub Rak. "Dynamic Assessment of Cyber Threats in the Field of Insurance." Risks 10, no. 12 (2022): 222. http://dx.doi.org/10.3390/risks10120222.
Full textLi, Zong-Xun, Yu-Jun Li, Yi-Wei Liu, Cheng Liu, and Nan-Xin Zhou. "K-CTIAA: Automatic Analysis of Cyber Threat Intelligence Based on a Knowledge Graph." Symmetry 15, no. 2 (2023): 337. http://dx.doi.org/10.3390/sym15020337.
Full textMagnus Chukwuebuka Ahuchogu. "The Role of Cyber Threat Intelligence in Protecting National Infrastructure." Power System Technology 49, no. 1 (2025): 1548–69. https://doi.org/10.52783/pst.1699.
Full textIvanovich Vatin, Nikolai, and Rama Sundari. "Securing electric transportation networks: A machine learning-driven cyber threat detection." MATEC Web of Conferences 392 (2024): 01184. http://dx.doi.org/10.1051/matecconf/202439201184.
Full textSahrom Abu, Md, Siti Rahayu Selamat, Aswami Ariffin, and Robiah Yusof. "Cyber Threat Intelligence – Issue and Challenges." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 1 (2018): 371. http://dx.doi.org/10.11591/ijeecs.v10.i1.pp371-379.
Full textMd, Sahrom Abu, Rahayu Selamat Siti, Ariffin Aswami, and Yusof Robiah. "Cyber Threat Intelligence – Issue and Challenges." Indonesian Journal of Electrical Engineering and Computer Science 10, no. 1 (2018): 371–79. https://doi.org/10.11591/ijeecs.v10.i1.pp371-379.
Full textSufi, Fahim. "A GPT-Based Approach for Cyber Threat Assessment." AI 6, no. 5 (2025): 99. https://doi.org/10.3390/ai6050099.
Full textP.Ramya, P., R. R.Anitha, J. Rajalakshmi, and R. R.Dineshkumar. "Integrating Quantum Computing and NLP for Advanced Cyber Threat Detection." Journal of Cybersecurity and Information Management 14, no. 2 (2024): 186–97. http://dx.doi.org/10.54216/jcim.140213.
Full textAmmannamma, T., I. Chandana, K. Keerthana, and P. Greeshma. "Cyber Threat Alert Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2447–51. https://doi.org/10.22214/ijraset.2025.68760.
Full textJEYAPRAKASH S, Mr. "Cyber Threat Intelligence for Industrial Control System." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem46481.
Full text