In the digital era, threat actors employ sophisticated techniques for which, often, digital traces in the form of textual data are available. Cyber Threat Intelligence~(CTI) is related to all the solutions inherent to data collection, processing, and analysis useful to understand a threat actor's targets and attack behavior. Currently, CTI is assuming an always more crucial role in identifying and mitigating threats and enabling proactive defense strategies. In this context, NLP, an artificial intelligence branch, has emerged as a powerful tool for enhancing threat intelligence capabilities. This survey paper provides a comprehensive overview of NLP-based techniques applied in the context of threat intelligence. It begins by describing the ...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is in...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Artificial intelligence techniques have grown rapidly in recent years, and their applications in pra...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
Natural Language Processing (NLP) is a science aimed at computationally interpreting written languag...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Abstract: The rapid advancement of technology has led to an increasing dependence on digital infrast...
Sharing Threat Intelligence is now one of the biggest trends in cyber security industry. Today, no o...
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of comp...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is in...
Cyber Threat Intelligence (CTI) is information describing threat vectors, vulnerabilities, and attac...
Cyber Threat Intelligence (CTI) can be used by organisations to assist their security teams in safeg...
Artificial intelligence techniques have grown rapidly in recent years, and their applications in pra...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanis...
Natural Language Processing (NLP) is a science aimed at computationally interpreting written languag...
The growing dependency on interconnected devices makes cyber crime increasingly lucrative. Together ...
Cyber threat intelligence (CTI) sharing has gradually become an important means of dealing with secu...
Abstract: The rapid advancement of technology has led to an increasing dependence on digital infrast...
Sharing Threat Intelligence is now one of the biggest trends in cyber security industry. Today, no o...
In recent years, a considerable amount of effort has been devoted to cyber-threat protection of comp...
This paper presents an in-depth exploration of the application of Artificial Intelligence (AI), spec...
Cyber Threat Intelligence (CTI), which is knowledge of cyberspace threats gathered from security dat...
The rapid increase in malicious cyber-criminal activities has made the field of cybersecurity a cruc...
Doctor of PhilosophyDepartment of Computer ScienceWilliam H HsuThis research develops learning repre...
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is in...