Loading…
Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)
The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continu...
Saved in:
Published in: | IEEE transactions on dependable and secure computing 2022-07, Vol.19 (4), p.2149-2150 |
---|---|
Main Authors: | , , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3 |
---|---|
cites | |
container_end_page | 2150 |
container_issue | 4 |
container_start_page | 2149 |
container_title | IEEE transactions on dependable and secure computing |
container_volume | 19 |
creator | Samtani, Sagar Chen, Hsinchun Kantarcioglu, Murat Thuraisingham, Bhavani |
description | The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making. |
doi_str_mv | 10.1109/TDSC.2022.3168187 |
format | article |
fullrecord | <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TDSC_2022_3168187</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9821359</ieee_id><sourcerecordid>10_1109_TDSC_2022_3168187</sourcerecordid><originalsourceid>FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3</originalsourceid><addsrcrecordid>eNpVkL1OwzAUhS0EEqXwAIglIwwpvnYc22MUCkRUYiBIbJadXoNRSCsnA337JmqFxHSPzs8dPkKugS4AqL6vH97KBaOMLTjkCpQ8ITPQGaSUgjodtchEKrSEc3LR99-UskzpbEZelr_b1obOuhaTIg7BhybYNqm6Ads2fGLXYOI3MSl3DmNSf0W0w__09qOo0rKu7i7Jmbdtj1fHOyfvj8u6fE5Xr09VWazShlM1pBwAncvBScydX3uFkmsnRDNamVJ8bSVlwsmcOq4za9EKOXraWs-4kp7PCRz-NnHT9xG92cbwY-POADUTDTPRMBMNc6Qxbm4Om4CIf32tGHCh-R5VS1s7</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Samtani, Sagar ; Chen, Hsinchun ; Kantarcioglu, Murat ; Thuraisingham, Bhavani</creator><creatorcontrib>Samtani, Sagar ; Chen, Hsinchun ; Kantarcioglu, Murat ; Thuraisingham, Bhavani</creatorcontrib><description>The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2022.3168187</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Artificial intelligence ; Computer security ; Context modeling ; Cyber threat intelligence ; Deep learning ; Phishing ; Ransomware ; Special issues and sections ; Threat modeling</subject><ispartof>IEEE transactions on dependable and secure computing, 2022-07, Vol.19 (4), p.2149-2150</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3</citedby><orcidid>0000-0001-9795-9063 ; 0000-0002-4513-805X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9821359$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Samtani, Sagar</creatorcontrib><creatorcontrib>Chen, Hsinchun</creatorcontrib><creatorcontrib>Kantarcioglu, Murat</creatorcontrib><creatorcontrib>Thuraisingham, Bhavani</creatorcontrib><title>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making.</description><subject>Analytical models</subject><subject>Artificial intelligence</subject><subject>Computer security</subject><subject>Context modeling</subject><subject>Cyber threat intelligence</subject><subject>Deep learning</subject><subject>Phishing</subject><subject>Ransomware</subject><subject>Special issues and sections</subject><subject>Threat modeling</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpVkL1OwzAUhS0EEqXwAIglIwwpvnYc22MUCkRUYiBIbJadXoNRSCsnA337JmqFxHSPzs8dPkKugS4AqL6vH97KBaOMLTjkCpQ8ITPQGaSUgjodtchEKrSEc3LR99-UskzpbEZelr_b1obOuhaTIg7BhybYNqm6Ads2fGLXYOI3MSl3DmNSf0W0w__09qOo0rKu7i7Jmbdtj1fHOyfvj8u6fE5Xr09VWazShlM1pBwAncvBScydX3uFkmsnRDNamVJ8bSVlwsmcOq4za9EKOXraWs-4kp7PCRz-NnHT9xG92cbwY-POADUTDTPRMBMNc6Qxbm4Om4CIf32tGHCh-R5VS1s7</recordid><startdate>202207</startdate><enddate>202207</enddate><creator>Samtani, Sagar</creator><creator>Chen, Hsinchun</creator><creator>Kantarcioglu, Murat</creator><creator>Thuraisingham, Bhavani</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-9795-9063</orcidid><orcidid>https://orcid.org/0000-0002-4513-805X</orcidid></search><sort><creationdate>202207</creationdate><title>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</title><author>Samtani, Sagar ; Chen, Hsinchun ; Kantarcioglu, Murat ; Thuraisingham, Bhavani</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Analytical models</topic><topic>Artificial intelligence</topic><topic>Computer security</topic><topic>Context modeling</topic><topic>Cyber threat intelligence</topic><topic>Deep learning</topic><topic>Phishing</topic><topic>Ransomware</topic><topic>Special issues and sections</topic><topic>Threat modeling</topic><toplevel>online_resources</toplevel><creatorcontrib>Samtani, Sagar</creatorcontrib><creatorcontrib>Chen, Hsinchun</creatorcontrib><creatorcontrib>Kantarcioglu, Murat</creatorcontrib><creatorcontrib>Thuraisingham, Bhavani</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore / Electronic Library Online (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Samtani, Sagar</au><au>Chen, Hsinchun</au><au>Kantarcioglu, Murat</au><au>Thuraisingham, Bhavani</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2022-07</date><risdate>2022</risdate><volume>19</volume><issue>4</issue><spage>2149</spage><epage>2150</epage><pages>2149-2150</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making.</abstract><pub>IEEE</pub><doi>10.1109/TDSC.2022.3168187</doi><tpages>2</tpages><orcidid>https://orcid.org/0000-0001-9795-9063</orcidid><orcidid>https://orcid.org/0000-0002-4513-805X</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 1545-5971 |
ispartof | IEEE transactions on dependable and secure computing, 2022-07, Vol.19 (4), p.2149-2150 |
issn | 1545-5971 1941-0018 |
language | eng |
recordid | cdi_crossref_primary_10_1109_TDSC_2022_3168187 |
source | IEEE Electronic Library (IEL) Journals |
subjects | Analytical models Artificial intelligence Computer security Context modeling Cyber threat intelligence Deep learning Phishing Ransomware Special issues and sections Threat modeling |
title | Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI) |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T13%3A45%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Explainable%20Artificial%20Intelligence%20for%20Cyber%20Threat%20Intelligence%20(XAI-CTI)&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Samtani,%20Sagar&rft.date=2022-07&rft.volume=19&rft.issue=4&rft.spage=2149&rft.epage=2150&rft.pages=2149-2150&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2022.3168187&rft_dat=%3Ccrossref_ieee_%3E10_1109_TDSC_2022_3168187%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9821359&rfr_iscdi=true |