Loading…

Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)

The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continu...

Full description

Saved in:
Bibliographic Details
Published in:IEEE transactions on dependable and secure computing 2022-07, Vol.19 (4), p.2149-2150
Main Authors: Samtani, Sagar, Chen, Hsinchun, Kantarcioglu, Murat, Thuraisingham, Bhavani
Format: Article
Language:English
Subjects:
Citations: Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3
cites
container_end_page 2150
container_issue 4
container_start_page 2149
container_title IEEE transactions on dependable and secure computing
container_volume 19
creator Samtani, Sagar
Chen, Hsinchun
Kantarcioglu, Murat
Thuraisingham, Bhavani
description The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making.
doi_str_mv 10.1109/TDSC.2022.3168187
format article
fullrecord <record><control><sourceid>crossref_ieee_</sourceid><recordid>TN_cdi_crossref_primary_10_1109_TDSC_2022_3168187</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>9821359</ieee_id><sourcerecordid>10_1109_TDSC_2022_3168187</sourcerecordid><originalsourceid>FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3</originalsourceid><addsrcrecordid>eNpVkL1OwzAUhS0EEqXwAIglIwwpvnYc22MUCkRUYiBIbJadXoNRSCsnA337JmqFxHSPzs8dPkKugS4AqL6vH97KBaOMLTjkCpQ8ITPQGaSUgjodtchEKrSEc3LR99-UskzpbEZelr_b1obOuhaTIg7BhybYNqm6Ads2fGLXYOI3MSl3DmNSf0W0w__09qOo0rKu7i7Jmbdtj1fHOyfvj8u6fE5Xr09VWazShlM1pBwAncvBScydX3uFkmsnRDNamVJ8bSVlwsmcOq4za9EKOXraWs-4kp7PCRz-NnHT9xG92cbwY-POADUTDTPRMBMNc6Qxbm4Om4CIf32tGHCh-R5VS1s7</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</title><source>IEEE Electronic Library (IEL) Journals</source><creator>Samtani, Sagar ; Chen, Hsinchun ; Kantarcioglu, Murat ; Thuraisingham, Bhavani</creator><creatorcontrib>Samtani, Sagar ; Chen, Hsinchun ; Kantarcioglu, Murat ; Thuraisingham, Bhavani</creatorcontrib><description>The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making.</description><identifier>ISSN: 1545-5971</identifier><identifier>EISSN: 1941-0018</identifier><identifier>DOI: 10.1109/TDSC.2022.3168187</identifier><identifier>CODEN: ITDSCM</identifier><language>eng</language><publisher>IEEE</publisher><subject>Analytical models ; Artificial intelligence ; Computer security ; Context modeling ; Cyber threat intelligence ; Deep learning ; Phishing ; Ransomware ; Special issues and sections ; Threat modeling</subject><ispartof>IEEE transactions on dependable and secure computing, 2022-07, Vol.19 (4), p.2149-2150</ispartof><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3</citedby><orcidid>0000-0001-9795-9063 ; 0000-0002-4513-805X</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/9821359$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,27924,27925,54796</link.rule.ids></links><search><creatorcontrib>Samtani, Sagar</creatorcontrib><creatorcontrib>Chen, Hsinchun</creatorcontrib><creatorcontrib>Kantarcioglu, Murat</creatorcontrib><creatorcontrib>Thuraisingham, Bhavani</creatorcontrib><title>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</title><title>IEEE transactions on dependable and secure computing</title><addtitle>TDSC</addtitle><description>The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making.</description><subject>Analytical models</subject><subject>Artificial intelligence</subject><subject>Computer security</subject><subject>Context modeling</subject><subject>Cyber threat intelligence</subject><subject>Deep learning</subject><subject>Phishing</subject><subject>Ransomware</subject><subject>Special issues and sections</subject><subject>Threat modeling</subject><issn>1545-5971</issn><issn>1941-0018</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNpVkL1OwzAUhS0EEqXwAIglIwwpvnYc22MUCkRUYiBIbJadXoNRSCsnA337JmqFxHSPzs8dPkKugS4AqL6vH97KBaOMLTjkCpQ8ITPQGaSUgjodtchEKrSEc3LR99-UskzpbEZelr_b1obOuhaTIg7BhybYNqm6Ads2fGLXYOI3MSl3DmNSf0W0w__09qOo0rKu7i7Jmbdtj1fHOyfvj8u6fE5Xr09VWazShlM1pBwAncvBScydX3uFkmsnRDNamVJ8bSVlwsmcOq4za9EKOXraWs-4kp7PCRz-NnHT9xG92cbwY-POADUTDTPRMBMNc6Qxbm4Om4CIf32tGHCh-R5VS1s7</recordid><startdate>202207</startdate><enddate>202207</enddate><creator>Samtani, Sagar</creator><creator>Chen, Hsinchun</creator><creator>Kantarcioglu, Murat</creator><creator>Thuraisingham, Bhavani</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0001-9795-9063</orcidid><orcidid>https://orcid.org/0000-0002-4513-805X</orcidid></search><sort><creationdate>202207</creationdate><title>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</title><author>Samtani, Sagar ; Chen, Hsinchun ; Kantarcioglu, Murat ; Thuraisingham, Bhavani</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>Analytical models</topic><topic>Artificial intelligence</topic><topic>Computer security</topic><topic>Context modeling</topic><topic>Cyber threat intelligence</topic><topic>Deep learning</topic><topic>Phishing</topic><topic>Ransomware</topic><topic>Special issues and sections</topic><topic>Threat modeling</topic><toplevel>online_resources</toplevel><creatorcontrib>Samtani, Sagar</creatorcontrib><creatorcontrib>Chen, Hsinchun</creatorcontrib><creatorcontrib>Kantarcioglu, Murat</creatorcontrib><creatorcontrib>Thuraisingham, Bhavani</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Xplore / Electronic Library Online (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE transactions on dependable and secure computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Samtani, Sagar</au><au>Chen, Hsinchun</au><au>Kantarcioglu, Murat</au><au>Thuraisingham, Bhavani</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)</atitle><jtitle>IEEE transactions on dependable and secure computing</jtitle><stitle>TDSC</stitle><date>2022-07</date><risdate>2022</risdate><volume>19</volume><issue>4</issue><spage>2149</spage><epage>2150</epage><pages>2149-2150</pages><issn>1545-5971</issn><eissn>1941-0018</eissn><coden>ITDSCM</coden><abstract>The papers in this special section focus on explainable artificial intelligence for cyber threat intelligence. Despite concerted efforts from industry, academia, and government on improving cybersecurity capabilities, cyber-threats such as ransomware, fake news, advanced malware, and others, continue to exact a substantial toll on modern infrastructure and day-to-day societal operations. To help combat the ever-growing quantity and severity of cyber-threats, many organizations are adopting Cyber Threat Intelligence (CTI). At its core, CTI is a data-driven process that aims to identify emerging threats and key threat actors to help enable effective cybersecurity decision-making.</abstract><pub>IEEE</pub><doi>10.1109/TDSC.2022.3168187</doi><tpages>2</tpages><orcidid>https://orcid.org/0000-0001-9795-9063</orcidid><orcidid>https://orcid.org/0000-0002-4513-805X</orcidid><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier ISSN: 1545-5971
ispartof IEEE transactions on dependable and secure computing, 2022-07, Vol.19 (4), p.2149-2150
issn 1545-5971
1941-0018
language eng
recordid cdi_crossref_primary_10_1109_TDSC_2022_3168187
source IEEE Electronic Library (IEL) Journals
subjects Analytical models
Artificial intelligence
Computer security
Context modeling
Cyber threat intelligence
Deep learning
Phishing
Ransomware
Special issues and sections
Threat modeling
title Explainable Artificial Intelligence for Cyber Threat Intelligence (XAI-CTI)
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-06T13%3A45%3A37IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_ieee_&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Explainable%20Artificial%20Intelligence%20for%20Cyber%20Threat%20Intelligence%20(XAI-CTI)&rft.jtitle=IEEE%20transactions%20on%20dependable%20and%20secure%20computing&rft.au=Samtani,%20Sagar&rft.date=2022-07&rft.volume=19&rft.issue=4&rft.spage=2149&rft.epage=2150&rft.pages=2149-2150&rft.issn=1545-5971&rft.eissn=1941-0018&rft.coden=ITDSCM&rft_id=info:doi/10.1109/TDSC.2022.3168187&rft_dat=%3Ccrossref_ieee_%3E10_1109_TDSC_2022_3168187%3C/crossref_ieee_%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c308t-311ebb61b7e6bfdf8e739b55c61b4883da7025b760b394aaea57da79aaf2387f3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=9821359&rfr_iscdi=true