-
1
Application of security threat intelligence based on big data analysis in telecom operators
Published 2020-11-01Subjects: “…threat intelligence…”
Get full text
Article -
2
Application of security threat intelligence based on big data analysis in telecom operators
Published 2020-11-01Subjects: “…threat intelligence;active defense;productive process of threat intelligence;application scenarios of threat intelligence…”
Get full text
Article -
3
A Review of the Insider Threat, a Practitioner Perspective Within the U.K. Financial Services
Published 2024-01-01Subjects: Get full text
Article -
4
The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response
Published 2025-04-01Subjects: “…Cyber threat…”
Get full text
Article -
5
Threat ripple model: A model to characterize business-oriented attacks based on business dependencies
Published 2025-01-01Subjects: Get full text
Article -
6
Deriving Usability Evaluation Criteria for Threat Modeling Tools
Published 2025-01-01Subjects: Get full text
Article -
7
APT attack threat-hunting network model based on hypergraph Transformer
Published 2024-02-01Subjects: Get full text
Article -
8
Analysis of the human factor as an internal threat to the security of an organization
Published 2023-06-01Subjects: Get full text
Article -
9
О ПРОБЛЕМЕ ПРЕДОТВРАЩЕНИЯ ВНУТРЕННЕГО КОНФЛИКТА В УСЛОВИЯХ РЕАЛЬНОЙ УГРОЗЫ ЕГО ВОЗНИКНОВЕНИЯ
Published 2015-01-01Subjects: Get full text
Article -
10
Analysis of the human factor as an internal threat to the security of an organization
Published 2023-06-01Subjects: Get full text
Article -
11
Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions
Published 2025-07-01Subjects: “…Cyber threat…”
Get full text
Article -
12
Hybrid nature of modern threats for cybersecurity and information security
Published 2020-03-01Subjects: “…hybrid threats…”
Get full text
Article -
13
Dynamic Expected Threat (DxT) Model: Addressing the Deficit of Realism in Football Action Evaluation
Published 2025-04-01Subjects: Get full text
Article -
14
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01Subjects: “…advanced persistent threat…”
Get full text
Article -
15
Local residents’ attitudes toward and contact with international students: a perspective from Montreal, Quebec
Published 2024-11-01Subjects: Get full text
Article -
16
Research on entity recognition and alignment of APT attack based on Bert and BiLSTM-CRF
Published 2022-06-01Subjects: “…advanced persistent threat;threat intelligence extraction;entity recognition;entity alignment;deep learning…”
Get full text
Article -
17
Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework
Published 2025-01-01Subjects: “…Cyber threat intelligence (CTI)…”
Get full text
Article -
18
Network security threat warning method based on qualitative differential game
Published 2018-08-01Subjects: “…network security threat…”
Get full text
Article -
19
Insider threat detection for specific threat scenarios
Published 2025-03-01Subjects: “…Insider threat…”
Get full text
Article -
20
Opportunities and threats for agrifood firms. The case of wineries applying Rasch analysis
Published 2024-05-01Subjects: Get full text
Article