Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
by
Zacharis, Alexandros
, Katos, Vasilios
, Patsakis, Constantinos
in
Artificial intelligence
/ Coding and Information Theory
/ Communications Engineering
/ Computer Communication Networks
/ Computer Science
/ Cryptology
/ Cybersecurity
/ Effectiveness
/ Efficacy
/ Feedback
/ Forecasting
/ Impact analysis
/ Information gathering
/ Intelligence
/ Intelligence gathering
/ Internet
/ Management of Computing and Information Systems
/ Networks
/ Operating Systems
/ Regular Contribution
/ Security
/ Threat evaluation
/ Threats
2024
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
by
Zacharis, Alexandros
, Katos, Vasilios
, Patsakis, Constantinos
in
Artificial intelligence
/ Coding and Information Theory
/ Communications Engineering
/ Computer Communication Networks
/ Computer Science
/ Cryptology
/ Cybersecurity
/ Effectiveness
/ Efficacy
/ Feedback
/ Forecasting
/ Impact analysis
/ Information gathering
/ Intelligence
/ Intelligence gathering
/ Internet
/ Management of Computing and Information Systems
/ Networks
/ Operating Systems
/ Regular Contribution
/ Security
/ Threat evaluation
/ Threats
2024
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
by
Zacharis, Alexandros
, Katos, Vasilios
, Patsakis, Constantinos
in
Artificial intelligence
/ Coding and Information Theory
/ Communications Engineering
/ Computer Communication Networks
/ Computer Science
/ Cryptology
/ Cybersecurity
/ Effectiveness
/ Efficacy
/ Feedback
/ Forecasting
/ Impact analysis
/ Information gathering
/ Intelligence
/ Intelligence gathering
/ Internet
/ Management of Computing and Information Systems
/ Networks
/ Operating Systems
/ Regular Contribution
/ Security
/ Threat evaluation
/ Threats
2024
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
Journal Article
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
2024
Request Book From Autostore
and Choose the Collection Method
Overview
The escalating complexity and impact of cyber threats require organisations to rehearse responses to cyber-attacks by routinely conducting cyber security exercises. However, the effectiveness of these exercises is limited by the exercise planners’ ability to replicate real-world scenarios in a timely manner that is, most importantly, tailored to the training audience and sector impacted. To address this issue, we propose the integration of AI-driven sectorial threat intelligence and forecasting to identify emerging and relevant threats and anticipate their impact in different industries. By incorporating such automated analysis and forecasting into the design of cyber security exercises, organisations can simulate real-world scenarios more accurately and assess their ability to respond to emerging threats. Fundamentally, our approach enhances the effectiveness of cyber security exercises by tailoring the scenarios to reflect the threats that are more relevant and imminent to the sector of the targeted organisation, thereby enhancing its preparedness for cyber attacks. To assess the efficacy of our forecasting methodology, we conducted a survey with domain experts and report their feedback and evaluation of the proposed methodology.
Publisher
Springer Berlin Heidelberg,Springer Nature B.V
This website uses cookies to ensure you get the best experience on our website.