Integrated threat intelligence platform for security operations in organizations
Organizations have to establish strong security operations to protect their digital assets since cyberattacks are becoming more prevalent and sophisticated. Integrating threat intelligence into security operations is a fundamental strategy for enhancing an organization’s security posture. However, t...
| Published in: | Automatika |
|---|---|
| Main Authors: | K. U. Abinesh Kamal, S. V. Divya |
| Format: | Article |
| Language: | English |
| Published: |
Taylor & Francis Group
2024-04-01
|
| Subjects: | |
| Online Access: | https://www.tandfonline.com/doi/10.1080/00051144.2023.2295146 |
Similar Items
Use of Explainable Artificial Intelligence for Analyzing and Explaining Intrusion Detection Systems
by: Pamela Hermosilla, et al.
Published: (2025-04-01)
by: Pamela Hermosilla, et al.
Published: (2025-04-01)
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
by: Maiada M. Mahmoud, et al.
Published: (2025-01-01)
by: Maiada M. Mahmoud, et al.
Published: (2025-01-01)
APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
by: Vu Thi Phuong*, Hoang Thi Hong Ha, Dinh Gia Truong, Tran Thi Yen
Published: (2025-06-01)
by: Vu Thi Phuong*, Hoang Thi Hong Ha, Dinh Gia Truong, Tran Thi Yen
Published: (2025-06-01)
Post-Hoc Categorization Based on Explainable AI and Reinforcement Learning for Improved Intrusion Detection
by: Xavier Larriva-Novo, et al.
Published: (2024-12-01)
by: Xavier Larriva-Novo, et al.
Published: (2024-12-01)
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
ANOMALY DETECTION IN COMPUTER NETWORKS USING AI TECHNIQUES: А BENCHMARK STUDY
by: Stefan Ćirković, et al.
Published: (2025-09-01)
by: Stefan Ćirković, et al.
Published: (2025-09-01)
Enhanced Network Intrusion Detection System
by: Ketan Kotecha, et al.
Published: (2021-11-01)
by: Ketan Kotecha, et al.
Published: (2021-11-01)
Leveraging stacking machine learning models and optimization for improved cyberattack detection
by: Neha Pramanick, et al.
Published: (2025-05-01)
by: Neha Pramanick, et al.
Published: (2025-05-01)
Cyberattack detection in wireless sensor networks using a hybrid feature reduction technique with AI and machine learning methods
by: Mohamed H. Behiry, et al.
Published: (2024-01-01)
by: Mohamed H. Behiry, et al.
Published: (2024-01-01)
Performance Comparison of Random Forest and Decision Tree Algorithms for Anomaly Detection in Networks
by: Rafiq Fajar Ramadhan, et al.
Published: (2024-11-01)
by: Rafiq Fajar Ramadhan, et al.
Published: (2024-11-01)
Anomaly Detection with Various Machine Learning Classification Techniques over UNSW-NB15 Dataset
by: Martina Shushlevska, et al.
Published: (2022-03-01)
by: Martina Shushlevska, et al.
Published: (2022-03-01)
Reinforcing Network Security: Network Attack Detection Using Random Grove Blend in Weighted MLP Layers
by: Adel Binbusayyis
Published: (2024-05-01)
by: Adel Binbusayyis
Published: (2024-05-01)
An Efficient Network Intrusion Detection and Classification System
by: Iftikhar Ahmad, et al.
Published: (2022-02-01)
by: Iftikhar Ahmad, et al.
Published: (2022-02-01)
Current security threats in the national and international context
by: Cristea Lavinia Mihaela
Published: (2020-06-01)
by: Cristea Lavinia Mihaela
Published: (2020-06-01)
Evaluating the Performance of Machine Learning Classifiers for Network Intrusion Detection: A Comparative Study Using the UNSW-NB15 Dataset
by: Iwan Handoyo Putro
Published: (2025-07-01)
by: Iwan Handoyo Putro
Published: (2025-07-01)
A detailed study of resampling algorithms for cyberattack classification in engineering applications
by: Óscar Mogollón Gutiérrez, et al.
Published: (2024-04-01)
by: Óscar Mogollón Gutiérrez, et al.
Published: (2024-04-01)
Artificial Intelligence in Network Security with Autonomous Threat Response Systems
by: Mohammed Abdul Jaleel Maktoof, et al.
Published: (2025-07-01)
by: Mohammed Abdul Jaleel Maktoof, et al.
Published: (2025-07-01)
A Deep Learning Approach for Network Intrusion Detection Using a Small Features Vector
by: Humera Ghani, et al.
Published: (2023-08-01)
by: Humera Ghani, et al.
Published: (2023-08-01)
Prediction of Network Threats and Attacks by Mathematical Simulation
by: Daniil Doroshenko
Published: (2024-11-01)
by: Daniil Doroshenko
Published: (2024-11-01)
Cyber threats in rail traffic in Poland
by: Alina Paklerska
Published: (2023-12-01)
by: Alina Paklerska
Published: (2023-12-01)
Enhanced Intrusion Detection Systems Performance with UNSW-NB15 Data Analysis
by: Shweta More, et al.
Published: (2024-02-01)
by: Shweta More, et al.
Published: (2024-02-01)
Hybrid GWQBBA model for optimized classification of attacks in Intrusion Detection System
by: Moneerah Alotaibi, et al.
Published: (2025-03-01)
by: Moneerah Alotaibi, et al.
Published: (2025-03-01)
Giải pháp phát hiện xâm nhập mạng sử dụng mô hình học sâu
by: Lê Anh Quân, et al.
Published: (2025-06-01)
by: Lê Anh Quân, et al.
Published: (2025-06-01)
Overview on Intrusion Detection Systems Design Exploiting Machine Learning for Networking Cybersecurity
by: Pierpaolo Dini, et al.
Published: (2023-06-01)
by: Pierpaolo Dini, et al.
Published: (2023-06-01)
Spark Configurations to Optimize Decision Tree Classification on UNSW-NB15
by: Sikha Bagui, et al.
Published: (2022-04-01)
by: Sikha Bagui, et al.
Published: (2022-04-01)
Recursive Feature Elimination with Cross-Validation with Decision Tree: Feature Selection Method for Machine Learning-Based Intrusion Detection Systems
by: Mohammed Awad, et al.
Published: (2023-09-01)
by: Mohammed Awad, et al.
Published: (2023-09-01)
Cybersecurity and Security of the Banking Business Under Martial Law
by: Serhii Azarenkov
Published: (2025-04-01)
by: Serhii Azarenkov
Published: (2025-04-01)
Deep learning model for intrusion detection system utilizing convolution neural network
by: Kamil Waad Falah, et al.
Published: (2023-08-01)
by: Kamil Waad Falah, et al.
Published: (2023-08-01)
On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities
by: Ricardo Fernandes, et al.
Published: (2023-01-01)
by: Ricardo Fernandes, et al.
Published: (2023-01-01)
Cyber Threat Inference Focused on Threat Class Sequence With Threat Class Sequence System
by: Hyoungjun Kim, et al.
Published: (2025-01-01)
by: Hyoungjun Kim, et al.
Published: (2025-01-01)
Application of security threat intelligence based on big data analysis in telecom operators
by: Mingxia BO, et al.
Published: (2020-11-01)
by: Mingxia BO, et al.
Published: (2020-11-01)
Application of security threat intelligence based on big data analysis in telecom operators
by: Mingxia BO, et al.
Published: (2020-11-01)
by: Mingxia BO, et al.
Published: (2020-11-01)
Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive Survey
by: Mamoona Humayun, et al.
Published: (2024-01-01)
by: Mamoona Humayun, et al.
Published: (2024-01-01)
An Improved Binary Spider Wasp Optimization Algorithm for Intrusion Detection for Industrial Internet of Things
by: Mousa'b Mohammad Shtayat, et al.
Published: (2025-01-01)
by: Mousa'b Mohammad Shtayat, et al.
Published: (2025-01-01)
Cyber Threat Intelligence-Based Malicious URL Detection Model Using Ensemble Learning
by: Mohammed Alsaedi, et al.
Published: (2022-04-01)
by: Mohammed Alsaedi, et al.
Published: (2022-04-01)
Threat Hunting System for Protecting Critical Infrastructures Using a Machine Learning Approach
by: Mario Aragonés Lozano, et al.
Published: (2023-08-01)
by: Mario Aragonés Lozano, et al.
Published: (2023-08-01)
Literature Review of Machine Learning and Threat Intelligence in Cloud Security
by: Rrezearta Thaqi, et al.
Published: (2025-01-01)
by: Rrezearta Thaqi, et al.
Published: (2025-01-01)
Semi-supervised Network Traffic Anomaly Detection Method Based on GRU
by: LI Haitao, WANG Ruimin, DONG Weiyu, JIANG Liehui
Published: (2023-03-01)
by: LI Haitao, WANG Ruimin, DONG Weiyu, JIANG Liehui
Published: (2023-03-01)
Instrumenting OpenCTI with a Capability for Attack Attribution Support
by: Sami Ruohonen, et al.
Published: (2024-01-01)
by: Sami Ruohonen, et al.
Published: (2024-01-01)
Cybersecurity of Smart Grids: Requirements, Threats, and Countermeasures
by: Edyta Karolina Szczepaniuk, et al.
Published: (2025-09-01)
by: Edyta Karolina Szczepaniuk, et al.
Published: (2025-09-01)
Similar Items
-
Use of Explainable Artificial Intelligence for Analyzing and Explaining Intrusion Detection Systems
by: Pamela Hermosilla, et al.
Published: (2025-04-01) -
XI2S-IDS: An Explainable Intelligent 2-Stage Intrusion Detection System
by: Maiada M. Mahmoud, et al.
Published: (2025-01-01) -
APPLYING TRANSFORMER ARCHITECTURE TO ENHANCE ATTACK DETECTION PERFORMANCE IN INTRUSION DETECTION SYSTEMS
by: Vu Thi Phuong*, Hoang Thi Hong Ha, Dinh Gia Truong, Tran Thi Yen
Published: (2025-06-01) -
Post-Hoc Categorization Based on Explainable AI and Reinforcement Learning for Improved Intrusion Detection
by: Xavier Larriva-Novo, et al.
Published: (2024-12-01) -
A Methodology to Evaluate Standards and Platforms within Cyber Threat Intelligence
by: Alessandra de Melo e Silva, et al.
Published: (2020-06-01)
