Communities
Connect sessions
AI calendar
Organizations
Join Slack
Contact Sales
Search
Open menu
Home
Papers
2103.03530
Cited By
v1
v2
v3
v4
v5 (latest)
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence
European Intelligence and Security Informatics Conference (EISIC), 2017
5 March 2021
Vasileios Mavroeidis
Siri Bromander
Re-assign community
ArXiv (abs)
PDF
HTML
Papers citing
"Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence"
28 / 28 papers shown
Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence
Y. Meng
Luoxi Tang
Feiyang Yu
Jinyuan Jia
Guanhua Yan
Ping Yang
Zhaohan Xi
213
1
0
28 Sep 2025
Incorporating Taxonomies of Cyber Incidents Into Detection Networks for Improved Detection Performance
Ryan Warnick
35
0
0
13 Aug 2025
How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information
ACM Southeast Regional Conference (ACMSE), 2025
Irdin Pekaric
Clemens Sauerwein
Simon Laichner
Ruth Breu
189
2
0
19 Apr 2025
AttackSeqBench: Benchmarking the Capabilities of LLMs for Attack Sequences Understanding
Javier Yong
Javier Yong
Yunshan Ma
Kuei Chen
Anis Yusof
Zhenkai Liang
E. Chang
515
2
0
05 Mar 2025
Towards an Improved Taxonomy of Attacks related to Digital Identities and Identity Management Systems
Daniela Pöhn
Wolfgang Hommel
196
4
0
23 Jul 2024
Review of Generative AI Methods in Cybersecurity
Yagmur Yigit
William J. Buchanan
Madjid G Tehrani
Leandros A. Maglaras
AAML
510
44
0
13 Mar 2024
TIPS: Threat Sharing Information Platform for Enhanced Security
Lakshmi Rama Kiran Pasumarthy
Hisham Ali
William J. Buchanan
Jawad Ahmad
A. Jøsang
Vasileios Mavroeidis
M. Lemoudden
99
1
0
08 Mar 2024
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion
Nan Xiao
Bo Lang
Ting Wang
Yikai Chen
171
23
0
20 Feb 2024
Assessing the Threat Level of Software Supply Chains with the Log Model
Luis Soeiro
Thomas Robert
Stefano Zacchiroli
223
1
0
20 Nov 2023
MITRE ATT&CK: State of the Art and Way Forward
ACM Computing Surveys (ACM Comput. Surv.), 2023
Bader Al-Sada
Alireza Sadighian
Gabriele Oligeri
240
64
0
27 Aug 2023
Creating Android Malware Knowledge Graph Based on a Malware Ontology
A. Sabbah
Mohammed Kharma
Mustafa Jarrar
85
0
0
04 Aug 2023
Towards a better labeling process for network security datasets
Sebastian Garcia
Veronica Valeros
206
3
0
02 May 2023
SoK: The MITRE ATT&CK Framework in Research and Practice
Shanto Roy
E. Panaousis
C. Noakes
Aron Laszka
S. Panda
G. Loukas
239
15
0
14 Apr 2023
A data-driven analysis of UK cyber defence
J. McKeown
44
0
0
13 Mar 2023
Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations
ARES (ARES), 2022
Lukáš Sadlek
Pavel Čeleda
Daniel Tovarňák
188
6
0
29 Jun 2022
CELEST: Federated Learning for Globally Coordinated Threat Detection
IEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Talha Ongun
Simona Boboila
Alina Oprea
Tina Eliassi-Rad
Jason Hiser
Jack W. Davidson
FedML
445
6
0
23 May 2022
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection
Computers & electrical engineering (CEE), 2022
Mohanad Sarhan
Wai Weng Lo
S. Layeghy
Marius Portmann
340
110
0
08 Apr 2022
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models
R. Czekster
Roberto Metere
C. Morisset
205
3
0
07 Apr 2022
A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS
Kathy Nguyen
S. Pal
Zahra Jadidi
A. Dorri
Raja Jurdak
169
15
0
01 Dec 2021
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
Arpan Bhattacharjee
S. Badsha
Md Tamjid Hossain
Charalambos Konstantinou
Xueping Liang
233
3
0
28 Oct 2021
On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence
Vasileios Mavroeidis
Pavel Eis
M. Zádník
M. Caselli
Bret Jordan
81
16
0
20 Oct 2021
Knowledge mining of unstructured information: application to cyber-domain
Scientific Reports (Sci Rep), 2021
Tuomas Takko
Kunal Bhattacharya
M. Lehto
Pertti Jalasvirta
Aapo Cederberg
K. Kaski
266
9
0
08 Sep 2021
Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling
Md. Imran Hossen
Ashraful Islam
Farzana Anowar
Eshtiak Ahmed
M. M. Rahman
Xiali
Hei
241
7
0
16 Aug 2021
Data-Driven Threat Hunting Using Sysmon
International Conference on Cryptography, Security and Privacy (ICCSP), 2018
Vasileios Mavroeidis
A. Jøsang
59
48
0
28 Mar 2021
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence
International Conference on Cyber Conflict (CyCon), 2021
Vasileios Mavroeidis
R. Hohimer
Timothy Casey
A. Jøsang
149
34
0
03 Mar 2021
Security audit logging in microservice-based systems: survey of architecture patterns
Voprosy kiberbezopasnosti (VK), 2021
A. Barabanov
Denis Makrushin
61
4
0
18 Feb 2021
MALOnt: An Ontology for Malware Threat Intelligence
Nidhi Rastogi
Sharmishtha Dutta
Mohammed J Zaki
Alex Gittens
Charu C. Aggarwal
189
54
0
20 Jun 2020
Intelligence-based Cybersecurity Awareness Training- an Exploratory Project
Tam n. Nguyen
Lydia Sbityakov
S. Scoggins
119
4
0
11 Dec 2018
1
Page 1 of 1