Journal articles on the topic 'Threat Intelligence Analytics'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Threat Intelligence Analytics.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kingsley David Onyewuchi Ofoegbu, Olajide Soji Osundare, Chidiebere Somadina Ike, Ololade Gilbert Fakeyede, and Adebimpe Bolatito Ige. "Data-Driven Cyber Threat Intelligence: Leveraging Behavioral Analytics for Proactive Defense Mechanisms." Computer Science & IT Research Journal 4, no. 3 (2023): 502–24. http://dx.doi.org/10.51594/csitrj.v4i3.1501.
Full textREDDY, PERLA MAHESH, and SMT. M. VANI. "Cyber Threat Intelligence Analysis for Proactive Cybersecurity Defense: A Survey and New Perspectives." Journal of Engineering Sciences 16, no. 04 (2025): 107–13. https://doi.org/10.36893/jes.2025.v16i04.018.
Full textDr. Rajitha Kotoju and Md. Abrar Khan. "Cognitive Cyber Threat Intelligence: AI-Driven Behavioural Profiling for Proactive Security." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 156–59. https://doi.org/10.46647/10.46647/ijetms.2025.v09si01.025.
Full textKrutika Dwarka Naidu, Dr. Syed Irfan Ali, Sujal Shyam Hasoriya, and Sujal Ganvir. "Threat Foresight: Web Threat Detection and Forecasting Trends and Insights." International Journal of Scientific Research in Science and Technology 12, no. 2 (2025): 129–33. https://doi.org/10.32628/ijsrst25122209.
Full textEnyinaya Stefano Okafor, Olatunji Akinrinola, Favour Oluwadamilare Usman, Olukunle Oladipupo Amoo, and Nneka Adaobi Ochuba. "CYBERSECURITY ANALYTICS IN PROTECTING SATELLITE TELECOMMUNICATIONS NETWORKS: A CONCEPTUAL DEVELOPMENT OF CURRENT TRENDS, CHALLENGES, AND STRATEGIC RESPONSES." International Journal of Applied Research in Social Sciences 6, no. 3 (2024): 254–66. http://dx.doi.org/10.51594/ijarss.v6i3.854.
Full textKumar Kande, Santosh. "Proactive Phishing Threat Exposure Mitigation through Adaptive Vulnerability Management: Utilizing Threat Intelligence, User Behavior Analytics, and Predictive Analytics." International Journal of Science and Research (IJSR) 12, no. 8 (2023): 2141–561. http://dx.doi.org/10.21275/sr241010075237.
Full textIsmail, Assoujaa. "Designing Effective Threat Hunting to Enhance Security Programs." WSEAS TRANSACTIONS ON COMMUNICATIONS 23 (December 30, 2024): 142–48. https://doi.org/10.37394/23204.2024.23.19.
Full textFalasi, Dr Mariam Al, and Dr Tao Zhang. "AUGMENTING SIEM WITH THREAT INTELLIGENCE FOR PREDICTIVE CYBER DEFENSE: A PROACTIVE THREAT HUNTING APPROACH." International Journal of Cyber Threat Intelligence and Secure Networking 2, no. 03 (2025): 1–5. https://doi.org/10.55640/ijctisn-v02i03-01.
Full textYogeswara, Reddy Avuthu. "Cloud-Native Security Analytics: Real-Time Threat Intelligence in DevSecOps Pipelines Using AI and Big Data." Journal of Scientific and Engineering Research 8, no. 8 (2021): 253–61. https://doi.org/10.5281/zenodo.14274206.
Full textTanjung, Rully Eko Setiawan, Muhammad Syaroni Rofii, and Stepi Anriani. "Customs Intelligence Surveillance and Analysis Tools in Anticipation of Smuggling Threats." Indonesian Journal of Multidisciplinary Science 2, no. 12 (2023): 4230–43. http://dx.doi.org/10.55324/ijoms.v2i12.668.
Full textBaskaran, Saravanakumar. "A Comprehensive Framework for Threat Intelligence-Driven Incident Detection." International Journal of Scientific Research and Management (IJSRM) 7, no. 08 (2019): 288–93. http://dx.doi.org/10.18535/ijsrm/v7i8.ec01.
Full textEdim Bassey Edim, Akpan Itoro Udofot, and Omotosho Moses Oluseyi. "AI-augmented cyber security threat intelligence – enhancing situational awareness." International Journal of Science and Research Archive 14, no. 1 (2025): 890–97. https://doi.org/10.30574/ijsra.2025.14.1.2650.
Full textABDULRAHMAN, IBRAHIM ABDUL, UZOAMAKA C. OGOR, GABRIEL TOSIN AYODELE, CHIDOZIE ANADOZIE, and JACOB ALEBIOSU. "AI-Driven Threat Intelligence and Automated Incident Response: Enhancing Cyber Resilience through Predictive Analytics." Research Journal in Civil, Industrial and Mechanical Engineering 2, no. 1 (2025): 16–32. https://doi.org/10.61424/rjcime.v2i1.236.
Full textSabeeruddin, Shaik. "Insider Threat Monitoring Frameworks: Leveraging Behavioral Analytics." International Journal on Science and Technology 15, no. 2 (2024): 1–7. https://doi.org/10.5281/zenodo.14752331.
Full textDr.Vijayalakshmi Chintamaneni, Dr.M.SreeRamu, and Shaik Abubakar Siddiq. "Insider Threats in the Age of Cyber Threat Intelligence: Behavioral Indicators and Detection Strategies." international journal of engineering technology and management sciences 9, Special Issue 1 (2025): 132–43. https://doi.org/10.46647/ijetms.2025.v09si01.022.
Full textBrandao, Pedro Ramos. "Exploring the Role of Artificial Intelligence in Detecting Advanced Persistent Threats." Computers 14, no. 7 (2025): 245. https://doi.org/10.3390/computers14070245.
Full textSandhya, Guduru. "AI-Driven Threat Hunting: Sigma Rules, Elastic EQL, and MITRE CAR Analytics in Splunk UBA." Journal of Scientific and Engineering Research 8, no. 12 (2021): 239–43. https://doi.org/10.5281/zenodo.15387322.
Full textReddy, Mr K. V. Siva Prasad, B. Mohith, P. Mahesh Babu, and K. Navtej. "CyberSleuth AI: Intelligent Network Forensics Analyzer." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 1643–47. https://doi.org/10.22214/ijraset.2025.68420.
Full textRahul Bhatia. "The Future of SIEM: How AI and ML Are Rewriting Threat Detection." Journal of Computer Science and Technology Studies 7, no. 7 (2025): 459–68. https://doi.org/10.32996/jcsts.2025.7.7.50.
Full textDatta, N. Bala Suresh. "Holistic Cyber Threat Intelligence System with Bert for Advanced Threat Detection." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 2662–64. https://doi.org/10.22214/ijraset.2025.68780.
Full textNagamalla, Vishwesh, J. Raj karkee, and Ravi Kumar Sanapala. "Integrating Predictive Big Data Analytics with Behavioral Machine Learning Models for Proactive Threat Intelligence in Industrial IoT Cybersecurity." International Journal of Wireless and Ad Hoc Communication 7, no. 2 (2023): 08–24. http://dx.doi.org/10.54216/ijwac.070201.
Full textJohn, Jeo. "Enhancing Cybersecurity Posture through Dynamic Vulnerability Matching and Threat Intelligence Integration Precious." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 06 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem35927.
Full textHafsat, Bida Abdullahi. "Developing Intelligent Cyber Threat Detection Systems Through Advanced Data Analytics." Developing Intelligent Cyber Threat Detection Systems Through Advanced Data Analytics 9, no. 2 (2024): 10. https://doi.org/10.5281/zenodo.10670055.
Full textSiva, Krishna Jampani. "AI-Driven Threat Intelligence: Revolutionizing Proactive Cyber Defense." Journal of Scientific and Engineering Research 8, no. 6 (2021): 220–27. https://doi.org/10.5281/zenodo.14637382.
Full textSharma, Sujeet. "AI-Powered Cybersecurity: The Future of Threat Detection." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 04 (2025): 1–9. https://doi.org/10.55041/ijsrem45943.
Full textDesai, Aditya R. "A Review on Cybercrime Control through Behavioural Pattern Analysis Using a Comprehensive Database and Enhanced APIS." International Journal for Research in Applied Science and Engineering Technology 13, no. 4 (2025): 3304–9. https://doi.org/10.22214/ijraset.2025.68894.
Full textMagnus Chukwuebuka Ahuchogu. "The Role of Cyber Threat Intelligence in Protecting National Infrastructure." Power System Technology 49, no. 1 (2025): 1548–69. https://doi.org/10.52783/pst.1699.
Full textBhavik Patel, Patel Krunalkumar Bhagavanbhai, and Niravkumar Dhameliya. "Revolutionizing Cybersecurity with AI: Predictive Threat Intelligence and Automated Response Systems." Darpan International Research Analysis 12, no. 4 (2024): 1–5. http://dx.doi.org/10.36676/dira.v12.i4.126.
Full textRAJESH RAJAMOHANAN NAIR. "Evaluating the Effectiveness of AI-Driven Threat Intelligence Systems: A Technical Analysis." Journal of Computer Science and Technology Studies 7, no. 3 (2025): 514–24. https://doi.org/10.32996/jcsts.2025.7.3.58.
Full textMaosa, Herbert, Karim Ouazzane, and Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework." International Journal of Information Security and Privacy 16, no. 1 (2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.
Full textBukowski, Michał. "Combating economic cybercrime using artificial intelligence (AI)." PRZEGLĄD POLICYJNY 151, no. 3 (2023): 339–65. http://dx.doi.org/10.5604/01.3001.0053.9746.
Full textHasan, Kamrul, Forhad Hossain, Al Amin, Yadab Sutradhar, Israt Jahan Jeny, and Shakik Mahmud. "Enhancing Proactive Cyber Defense: A Theoretical Framework for AI-Driven Predictive Cyber Threat Intelligence." Journal of Technologies Information and Communication 5, no. 1 (2025): 33122. https://doi.org/10.55267/rtic/16176.
Full textQamar, Sara, Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, and Bei-Tseng Chu. "Data-driven analytics for cyber-threat intelligence and information sharing." Computers & Security 67 (June 2017): 35–58. http://dx.doi.org/10.1016/j.cose.2017.02.005.
Full textResearcher. "THE ROLE OF AI IN DETECTING INSIDER THREATS IN HEALTHCARE ORGANIZATIONS." International Journal of Research In Computer Applications and Information Technology (IJRCAIT) 7, no. 2 (2024): 239–48. https://doi.org/10.5281/zenodo.13960643.
Full textDhanyamraju, Sri Anusha, M. Ananya, and Dechamma M.P Drishya. "Applications of Artificial Intelligence in Computer Engineering." Journal of Advanced Research in Artificial Intelligence & It's Applications 2, no. 2 (2025): 1–6. https://doi.org/10.5281/zenodo.14890815.
Full textJawaid, Syed Adnan. "Artificial Intelligence with Respect to Cyber Security." Journal of Advances in Artificial Intelligence 1, no. 2 (2023): 96–102. http://dx.doi.org/10.18178/jaai.2023.1.2.96-102.
Full textResearcher. "AI IN CYBERSECURITY: ADVANCEMENTS AND CHALLENGES." International Journal of Computer Engineering and Technology (IJCET) 15, no. 5 (2024): 992–1001. https://doi.org/10.5281/zenodo.13999861.
Full textIslam, S. A. Mohaiminul, MD Shadikul Bari, Ankur Sarkar, A. J. M. Obaidur Rahman Khan, and Rakesh Paul. "AI-Powered Threat Intelligence: Revolutionizing Cybersecurity with Proactive Risk Management for Critical Sectors." Journal of Artificial Intelligence General science (JAIGS) ISSN:3006-4023 7, no. 01 (2024): 1–8. https://doi.org/10.60087/jaigs.v7i01.291.
Full textDjenna, Amir, Ezedin Barka, Achouak Benchikh, and Karima Khadir. "Unmasking Cybercrime with Artificial-Intelligence-Driven Cybersecurity Analytics." Sensors 23, no. 14 (2023): 6302. http://dx.doi.org/10.3390/s23146302.
Full textAyyarrappan, Mariappan. "AI-driven Security Enhancements for Web Applications." International Scientific Journal of Engineering and Management 03, no. 08 (2024): 1–3. https://doi.org/10.55041/isjem01992.
Full textYadav, Dr Neha. "AI in Cybersecurity: A Literature review." International Scientific Journal of Engineering and Management 04, no. 05 (2025): 1–7. https://doi.org/10.55041/isjem03378.
Full textSwapnil Chawande. "The role of Artificial Intelligence in cybersecurity." World Journal of Advanced Engineering Technology and Sciences 11, no. 2 (2024): 683–96. https://doi.org/10.30574/wjaets.2024.11.2.0014.
Full textYilmaz, Erhan, and Ozgu Can. "Unveiling Shadows: Harnessing Artificial Intelligence for Insider Threat Detection." Engineering, Technology & Applied Science Research 14, no. 2 (2024): 13341–46. http://dx.doi.org/10.48084/etasr.6911.
Full textRavindar, Reddy Gopireddy, and Malik Bushra. "Artificial Intelligence, Security, and Business Analytics: A Convergence for Cyber Defense and Risk Mitigation." European Journal of Advances in Engineering and Technology 8, no. 12 (2021): 18–22. https://doi.org/10.5281/zenodo.15075069.
Full textChioma Susan Nwaimo, Adetumi Adewumi, and Daniel Ajiga. "Advanced data analytics and business intelligence: Building resilience in risk management." International Journal of Science and Research Archive 6, no. 2 (2022): 336–44. https://doi.org/10.30574/ijsra.2022.6.2.0121.
Full textJournal, of Global Research in Mathematical Archives(JGRMA). "Enhancing Threat Intelligence and Cyber Defense through Big Data Analytics: A Review Study." Journal of Global Research in Mathematical Archives (JGRMA) 12, no. 04 (2025): 01–06. https://doi.org/10.5281/zenodo.15223174.
Full textEniola, Akinola Odedina. "INTEGRATING AI-DRIVEN THREAT INTELLIGENCE INTO HEALTHCARE CYBER RISK ASSESSMENTS." International Journal of Engineering Technology Research & Management (IJETRM) 06, no. 08 (2022): 84–94. https://doi.org/10.5281/zenodo.15343248.
Full textKumari, Neelam, and Ashok Kumar. "Advanced Computational Techniques for Analyzing Cybersecurity Event Datasets Using Artificial Intelligence and Machine Learning." SCT Proceedings in Interdisciplinary Insights and Innovations 3 (January 1, 2025): 524. https://doi.org/10.56294/piii2025524.
Full textAdeola N. Raji, Abiola O. Olawore, Adeyinka Ayodeji, and Jennifer Joseph. "Integrating Artificial Intelligence, machine learning, and data analytics in cybersecurity: A holistic approach to advanced threat detection and response." World Journal of Advanced Research and Reviews 20, no. 3 (2023): 2005–24. http://dx.doi.org/10.30574/wjarr.2023.20.3.2741.
Full textAdeola N. Raji, Abiola O. Olawore, Adeyinka Ayodeji, and Jennifer Joseph. "Integrating Artificial Intelligence, machine learning, and data analytics in cybersecurity: A holistic approach to advanced threat detection and response." World Journal of Advanced Research and Reviews 24, no. 2 (2024): 091–110. http://dx.doi.org/10.30574/wjarr.2024.24.2.3197.
Full text