Knowledge Graphs and Semantic Web Tools in Cyber Threat Intelligence: A Systematic Literature Review
The amount of data related to cyber threats and cyber attack incidents is rapidly increasing. The extracted information can provide security analysts with useful Cyber Threat Intelligence (CTI) to enhance their decision-making. However, because the data sources are heterogeneous, there is a lack of...
| Published in: | Journal of Cybersecurity and Privacy |
|---|---|
| Main Authors: | Charalampos Bratsas, Efstathios Konstantinos Anastasiadis, Alexandros K. Angelidis, Lazaros Ioannidis, Rigas Kotsakis, Stefanos Ougiaroglou |
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2024-08-01
|
| Subjects: | |
| Online Access: | https://www.mdpi.com/2624-800X/4/3/25 |
Similar Items
Quality Dimensions for Automatic Assessment of Structured Cyber Threat Intelligence Data
by: Algimantas Venčkauskas, et al.
Published: (2025-04-01)
by: Algimantas Venčkauskas, et al.
Published: (2025-04-01)
Evaluating Cyber Threat Intelligence: Accuracy, Completeness, Relevance, and Freshness
by: Asad Ali, et al.
Published: (2025-01-01)
by: Asad Ali, et al.
Published: (2025-01-01)
Editorial: The impacts of cyber threat in the maritime ecosystem
by: Adam Turner, et al.
Published: (2024-02-01)
by: Adam Turner, et al.
Published: (2024-02-01)
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
by: Dimitrios Chatziamanetoglou, et al.
Published: (2024-02-01)
by: Dimitrios Chatziamanetoglou, et al.
Published: (2024-02-01)
APT-scope: A novel framework to predict advanced persistent threat groups from enriched heterogeneous information network of cyber threat intelligence
by: Burak Gulbay, et al.
Published: (2024-09-01)
by: Burak Gulbay, et al.
Published: (2024-09-01)
Real-Time Automated Cyber Threat Classification and Emerging Threat Detection Framework
by: Alemayehu Tilahun Haile, et al.
Published: (2025-01-01)
by: Alemayehu Tilahun Haile, et al.
Published: (2025-01-01)
Context-aware cyber-threat attribution based on hybrid features
by: Ehtsham Irshad, et al.
Published: (2024-06-01)
by: Ehtsham Irshad, et al.
Published: (2024-06-01)
An Integrated Approach to Cyber Risk Management with Cyber Threat Intelligence Framework to Secure Critical Infrastructure
by: Habib El Amin, et al.
Published: (2024-06-01)
by: Habib El Amin, et al.
Published: (2024-06-01)
Leveraging OSINT for Advanced Proactive Cybersecurity: Strategies and Solutions
by: Zafrir Avrahami, et al.
Published: (2025-01-01)
by: Zafrir Avrahami, et al.
Published: (2025-01-01)
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience
by: Saqib Saeed, et al.
Published: (2023-08-01)
by: Saqib Saeed, et al.
Published: (2023-08-01)
Cyber threats in mobile healthcare applications: systematic review of enabling technologies, threat models, detection approaches, and future directions
by: Anayo Chukwu Ikegwu, et al.
Published: (2025-07-01)
by: Anayo Chukwu Ikegwu, et al.
Published: (2025-07-01)
MILITARY TROLLS, PUBLIC DISTRACTIONS AND THE CYBER
by: Mihai-Lucian BÂRSAN
Published: (2017-06-01)
by: Mihai-Lucian BÂRSAN
Published: (2017-06-01)
Clustering APT Groups Through Cyber Threat Intelligence by Weighted Similarity Measurement
by: Zheng-Shao Chen, et al.
Published: (2024-01-01)
by: Zheng-Shao Chen, et al.
Published: (2024-01-01)
GLM-Based Fake Cybersecurity Threat Intelligence Detection Models and Algorithms
by: Junhao Qian, et al.
Published: (2025-10-01)
by: Junhao Qian, et al.
Published: (2025-10-01)
CYBER THREAT INTELLIGENCE AND INFORMATION SHARING IN CLOUD ECOSYSTEMS
by: Ankur Mahida, et al.
Published: (2025-03-01)
by: Ankur Mahida, et al.
Published: (2025-03-01)
Cybersecurity and Major Cyber Threats of Smart Meters: A Systematic Mapping Review
by: Jones Márcio Nambundo, et al.
Published: (2025-03-01)
by: Jones Márcio Nambundo, et al.
Published: (2025-03-01)
Smart Grid and wind generators: an overview of cyber threats and vulnerabilities of power supply networks
by: Ihor Fursov, et al.
Published: (2022-11-01)
by: Ihor Fursov, et al.
Published: (2022-11-01)
A Systematic Review of Cyber Threat Intelligence: The Effectiveness of Technologies, Strategies, and Collaborations in Combating Modern Threats
by: Pedro Santos, et al.
Published: (2025-07-01)
by: Pedro Santos, et al.
Published: (2025-07-01)
Reasons for the increase in cyber attacks: analysis of technical and non-technical factors
by: A. V. Vasilyev
Published: (2023-11-01)
by: A. V. Vasilyev
Published: (2023-11-01)
The Missing Case of Disinformation from the Cybersecurity Risk Continuum: A Comparative Assessment of Disinformation with Other Cyber Threats
by: Kevin Matthe Caramancion, et al.
Published: (2022-04-01)
by: Kevin Matthe Caramancion, et al.
Published: (2022-04-01)
Proactive Cyber Resilience: A Unified Assessment Methodology for Incident Forecasting With Cyber Threat Intelligence Integration
by: Hayat Abdulla Asad Cue, et al.
Published: (2025-01-01)
by: Hayat Abdulla Asad Cue, et al.
Published: (2025-01-01)
CyberTOMP: A Novel Systematic Framework to Manage Asset-Focused Cybersecurity From Tactical and Operational Levels
by: Manuel Dominguez-Dorado, et al.
Published: (2022-01-01)
by: Manuel Dominguez-Dorado, et al.
Published: (2022-01-01)
Survey of Federated Learning for Cyber Threat Intelligence in Industrial IoT: Techniques, Applications and Deployment Models
by: Abin Kumbalapalliyil Tom, et al.
Published: (2025-09-01)
by: Abin Kumbalapalliyil Tom, et al.
Published: (2025-09-01)
Systematic Cyber Threat Modeling for Maritime Operations: Attack Trees for Shipboard Systems
by: Omer F. Keskin, et al.
Published: (2025-03-01)
by: Omer F. Keskin, et al.
Published: (2025-03-01)
CYBER THREATS TO OT SYSTEMS IN THE ENERGY INDUSTRY
by: Grzegorz Pilarski, et al.
Published: (2023-08-01)
by: Grzegorz Pilarski, et al.
Published: (2023-08-01)
Various types of cyber threats
by: Luknar Ivana, et al.
Published: (2024-01-01)
by: Luknar Ivana, et al.
Published: (2024-01-01)
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
by: Mohammed Alsaedi, et al.
Published: (2022-04-01)
by: Mohammed Alsaedi, et al.
Published: (2022-04-01)
The pivotal role of software defined networks to safeguard against cyber attacks: a comprehensive review
by: Ahmed Aljughaiman, et al.
Published: (2025-04-01)
by: Ahmed Aljughaiman, et al.
Published: (2025-04-01)
Threat Intelligence Extraction Framework (TIEF) for TTP Extraction
by: Anooja Joy, et al.
Published: (2025-09-01)
by: Anooja Joy, et al.
Published: (2025-09-01)
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
The Influence of South Africa’s Democratic Principles on its Cybersecurity Framework and Cyber Threat Response
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
by: Venencia Paidamoyo Nyambuya, et al.
Published: (2025-04-01)
The Challenges of Cyber Resilience in the Maritime Sector: Addressing the Weak Awareness of the Dangers Caused by Cyber Threats
by: Jasmin Ćelić, et al.
Published: (2025-04-01)
by: Jasmin Ćelić, et al.
Published: (2025-04-01)
Cyber Threat Actors for the Factory of the Future
by: Mirko Sailio, et al.
Published: (2020-06-01)
by: Mirko Sailio, et al.
Published: (2020-06-01)
SISTEM DETEKSI AKTIVITAS BERBAHAYA PADA SERVER MENGGUNAKAN CROWDSEC
by: Muhammad Arif Fadhly Ridha, et al.
Published: (2025-06-01)
by: Muhammad Arif Fadhly Ridha, et al.
Published: (2025-06-01)
Toward a Unified Understanding of Cyber Resilience: Concepts, Strategies, and Future Directions
by: Priyanka Verma, et al.
Published: (2025-01-01)
by: Priyanka Verma, et al.
Published: (2025-01-01)
Cyber Threats for Organizations of Financial Market Infrastructures
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
by: Natalia Georgievna Miloslavskaya, et al.
Published: (2016-03-01)
Analysis and Characterization of Cyber Threats Leveraging the MITRE ATT&CK Database
by: Bader Al-Sada, et al.
Published: (2024-01-01)
by: Bader Al-Sada, et al.
Published: (2024-01-01)
MAD-CTI: Cyber Threat Intelligence Analysis of the Dark Web Using a Multi-Agent Framework
by: Sayuj Shah, et al.
Published: (2025-01-01)
by: Sayuj Shah, et al.
Published: (2025-01-01)
Cyber Threats Classifications and Countermeasures in Banking and Financial Sector
by: Abdulbasit A. Darem, et al.
Published: (2023-01-01)
by: Abdulbasit A. Darem, et al.
Published: (2023-01-01)
Developing cyber defense strategies against future enemy threats on the horizon of 1405
by: Mohammad Sepehri
Published: (2022-02-01)
by: Mohammad Sepehri
Published: (2022-02-01)
Similar Items
-
Quality Dimensions for Automatic Assessment of Structured Cyber Threat Intelligence Data
by: Algimantas Venčkauskas, et al.
Published: (2025-04-01) -
Evaluating Cyber Threat Intelligence: Accuracy, Completeness, Relevance, and Freshness
by: Asad Ali, et al.
Published: (2025-01-01) -
Editorial: The impacts of cyber threat in the maritime ecosystem
by: Adam Turner, et al.
Published: (2024-02-01) -
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
by: Dimitrios Chatziamanetoglou, et al.
Published: (2024-02-01) -
APT-scope: A novel framework to predict advanced persistent threat groups from enriched heterogeneous information network of cyber threat intelligence
by: Burak Gulbay, et al.
Published: (2024-09-01)
