-
1
Threat intelligence using machine learning packet dissection
Published 2021Get full text
Conference or Workshop Item -
2
-
3
-
4
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…In Cybersecurity operation, it is an important task to share Cyber Threat Intelligence (CTI). In order to facilitate CTI sharing, we need to have a flexible representation for these information. …”
Get full text
Final Year Project (FYP) -
5
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
Get full text
Get full text
software, multimedia -
6
Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization /
Published 2023“…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
Get full text
Get full text
software, multimedia -
7
Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture /
Published 2023“…Next, you'll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations. …”
Get full text
Get full text
software, multimedia