-
1
Threat intelligence using machine learning packet dissection
Published 2021Get full text
Conference or Workshop Item -
2
-
3
SCE17-0185: STIX representation of cyber threat intelligence
Published 2018“…In Cybersecurity operation, it is an important task to share Cyber Threat Intelligence (CTI). In order to facilitate CTI sharing, we need to have a flexible representation for these information. …”
Get full text
Final Year Project (FYP) -
4
-
5
Framework of countermeasures (see: Anjuli Shere DPhil thesis, Chapter 8)
Published 2023Subjects:Dataset -
6
Cybersecurity Threats, Malware Trends, and Strategies : Discover risk mitigation strategies for modern threats to your organization /
Published 2023“…By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization's cybersecurity strategy.…”
Get full text
Get full text
software, multimedia -
7
The Importance of Bystanders in Threat Assessment and Management
Published 2025“…The principal aim of threat assessment is to prevent (primarily) intentional acts of harm. …”
Get full text
Book chapter -
8
EFFECTIVE THREAT INVESTIGATION FOR SOC ANALYSTS : The ultimate guide to examining various threats and attacker techniques using security logs /
Published 2023“…You’ll also explore popular threat intelligence platforms such as VirusTotal, AbuseIPDB, and X-Force for investigating cyber threats and successfully build your own sandbox environment for effective malware analysis. …”
Get full text
Get full text
software, multimedia -
9
Understanding the terrorist threat: a study on Iceland
Published 2015“…The paper analyses changes that Iceland needs to integrate within its current counter terrorism strategy as the terrorist threat becomes increasingly global. The various changes were identified through assessing why Iceland matters when discussing terrorism, the various threats that Iceland faces and the policies that Iceland need to follow to combat terrorism.…”
Get full text
Thesis -
10
Intelligence failure in U.S. counterterrorism
Published 2024“…This is significant because it supports the conclusion that more can be done in the analytical and information sharing domains to prevent al-Qaeda and insider threat attacks, while supporting the idea that state-sponsored attacks will be less likely to have data available to connect prior to an attack due to the higher degree of professionalism and advanced operational security resources available to government intelligence services supporting the attack planning.…”
Get full text
Thesis-Doctor of Philosophy -
11
Digging Up Threats to Validity: A Data Marshalling Approach to Sensitivity Analysis
Published 2024Get full text
Article -
12
Employee profiling via aspect-based sentiment and network for insider threats detection
Published 2020“…The profiles obtained from our framework can also be used to complement any existing expert and intelligent systems with additional capabilities in handling textual information such as, integration with profiles obtained from biometric behavior to form a more comprehensive threat detection system.…”
Get full text
Journal Article -
13
Open source cyber incidents intelligence gathering
Published 2021Get full text
Final Year Project (FYP) -
14
Algorithmic discrimination and ethical perspective of artificial intelligence /
Published [202“…This book delves into the complex intersection between artificial intelligence and human rights violations, shedding light on the far-reaching implications within the framework of discrimination and the pivotal role equality bodies play in combatting these issues. …”
Get full text
text -
15
Artificial intelligence image generator assisted descriptive writing
Published 2024“…The use of Artificial Intelligence (AI) is rapidly growing around the world, especially in the education field. …”
Get full text
Get full text
Article -
16
Exploring China’s cyber sovereignty concept and artificial intelligence governance model: a machine learning approach
Published 2025Journal article -
17
Artificial Intelligence as an enabler of quick and effective production repurposing manufacturing: an exploratory review and future research propositions
Published 2024“…For this purpose, recent advancements in technology and artificial intelligence (AI) could act as response solutions to conquer the threats linked with repurposing manufacturing (RM). …”
Get full text
Get full text
Article -
18
Class-based attack on graph convolution network
Published 2022Get full text
Final Year Project (FYP) -
19
Adversarial robustness of deep reinforcement learning
Published 2022Get full text
Thesis-Doctor of Philosophy -
20