Nowadays, there is an increasing need for cyber security professionals to make use of tools that automatically extract Cyber Threat Intelligence (CTI) relying on information collected from relevant blogs and news sources that are publicly available. When such sources are used, an important part of the CTI extraction process is content selection, in which pages that do not contain CTI-related information should be filtered out. For this task, we apply supervised machine learning-based text classification techniques, trained on a new dataset created for the purposes of this work. Furthermore, we show in practice the importance of a good content selection process in a commonly used CTI extraction pipeline, by inspecting the results of the Name...
Abstract—Public disclosure of important security information, such as knowledge of vulnerabilities o...
Due to rapid increase in volume of data on the Internet every day, it is becoming very difficult to ...
With the development of information communication technologies (ICT), more and more data is generate...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
The continuous increase in sophistication of threat actors over the years has made the use of action...
In this research, we use user defined labels from three internet text sources (Reddit, StackExchange...
Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to unde...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Recently, the emergence of the new malware has caused a major threat especially in finance sector in...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
Despite more than a decade of heightened focus on cybersecurity, the threat continues. To address po...
Timely analysis of cyber-security information necessitates automated information extraction from uns...
Abstract—Public disclosure of important security information, such as knowledge of vulnerabilities o...
Due to rapid increase in volume of data on the Internet every day, it is becoming very difficult to ...
With the development of information communication technologies (ICT), more and more data is generate...
Cyber Security has been a big concern especially in past one decade where it is witnessed that targe...
The use of more sophisticated tools and methods from cyber criminals has urged the cyber security co...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
The continuous increase in sophistication of threat actors over the years has made the use of action...
In this research, we use user defined labels from three internet text sources (Reddit, StackExchange...
Cyber threat intelligence (CTI) is an actionable information or insight an organization uses to unde...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Recently, the emergence of the new malware has caused a major threat especially in finance sector in...
With the increasing complexity of network attacks, an active defense based on intelligence sharing b...
Despite more than a decade of heightened focus on cybersecurity, the threat continues. To address po...
Timely analysis of cyber-security information necessitates automated information extraction from uns...
Abstract—Public disclosure of important security information, such as knowledge of vulnerabilities o...
Due to rapid increase in volume of data on the Internet every day, it is becoming very difficult to ...
With the development of information communication technologies (ICT), more and more data is generate...