Search alternatives:
ambient intelligence » cyber intelligence (Expand Search)
human intelligence » urban intelligence (Expand Search)
Showing 1 - 20 results of 330 for search '((human intelligence) OR (((threat intelligence) OR (ambient intelligence))))', query time: 0.14s Refine Results
  1. 1

    SCE17-0185: STIX representation of cyber threat intelligence by Phua, Kin Wee

    Published 2018
    “…This software system would utilize and leverage on STIX’s, a structured language for cyber threat intelligence, expressiveness, flexibility, extensibility, automatability and human-readability to generate CTI reports that would increase the efficiency and productivity of ingesting CTIs. …”
    Get full text
    Final Year Project (FYP)
  2. 2
  3. 3

    MAS.963 Ambient Intelligence, Spring 2004 by Maes, Patricia

    Published 2004
    “…This course focuses on Ambient Intelligence, and how it envisions a world where people are surrounded by intelligent and intuitive interfaces embedded in the everyday objects around them. …”
    Get full text
    Learning Object
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization / by Rains, Tim, author 656361, Youngblood, Timothy, writer of foreword 656362, Packt Publishing (Online service) 656336

    Published 2023
    “…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
    Get full text
    Get full text
    software, multimedia
  17. 17

    The Importance of Bystanders in Threat Assessment and Management by Borum, Randy, Rowe, Mary

    Published 2025
    “…The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. …”
    Get full text
    Book chapter
  18. 18
  19. 19

    EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs / by Yahia, Mostafa, author 656270

    Published 2023
    “…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
    Get full text
    Get full text
    software, multimedia
  20. 20