Search alternatives:
"object intelligence" » "ambient intelligence" (Expand Search)
Showing 1 - 7 results of 7 for search '(("object intelligence") OR ("threat intelligence"))', query time: 0.07s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…In Cybersecurity operation, it is an important task to share Cyber Threat Intelligence (CTI). In order to facilitate CTI sharing, we need to have a flexible representation for these information. …”
    Get full text
    Final Year Project (FYP)
  5. 5

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
    Get full text
    Get full text
    software, multimedia
  6. 6

    Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization / by Rains, Tim, author 656361, Youngblood, Timothy, writer of foreword 656362, Packt Publishing (Online service) 656336

    Published 2023
    “…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
    Get full text
    Get full text
    software, multimedia
  7. 7

    Security Orchestration, Automation, and Response for Security Analysts : Learn the secrets of SOAR to improve MTTA and MTTR and strengthen your organization's security posture / by Kovacevic, Benjamin, author 656337, Packt Publishing (Online service) 656336

    Published 2023
    “…Next, you'll learn how SOAR works and what its benefits are, including optimized threat intelligence, incident response, and utilizing threat hunting in investigations. …”
    Get full text
    Get full text
    software, multimedia