2023
DOI: 10.3390/electronics12173610
|View full text |Cite
|
Sign up to set email alerts
|

Novel Application of Open-Source Cyber Intelligence

Fahim Sufi

Abstract: The prevalence of cybercrime has emerged as a critical issue in contemporary society because of its far-reaching financial, social, and psychological implications. The negative effects of cyber-attacks extend beyond financial losses and disrupt people’s lives on social and psychological levels. Conventional practice involves cyber experts sourcing data from various outlets and applying personal discernment and rational inference to manually formulate cyber intelligence specific to a country. This traditional a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 44 publications
0
3
0
Order By: Relevance
“…By applying LDA, the study discerns underlying thematic patterns in the tweets, offering a comprehensive and granular perspective on the cyber-related discussions and conversations within distinct geographic contexts. It should be mentioned that generic preprocessing steps like transforming all the posts into lower case texts, removing stop words, removing hypertext markup tags, and tokenizing were performed similarly to recent studies in [17,22,35].…”
Section: Methodsmentioning
confidence: 99%
“…By applying LDA, the study discerns underlying thematic patterns in the tweets, offering a comprehensive and granular perspective on the cyber-related discussions and conversations within distinct geographic contexts. It should be mentioned that generic preprocessing steps like transforming all the posts into lower case texts, removing stop words, removing hypertext markup tags, and tokenizing were performed similarly to recent studies in [17,22,35].…”
Section: Methodsmentioning
confidence: 99%
“…The dataset offers both percentage-wise attack statistics and world-ranking-wise attack statistics, offering researchers a multifaceted view of the cyber-threat landscape. Though some of our recent projects have already utilized a smaller subset of this dataset, demonstrating its versatility and applicability across various domains [13][14][15][16], the full dataset had yet to be publicly released (as shown in Table 1). The public release and description of this dataset offers numerous benefits.…”
Section: Introductionmentioning
confidence: 99%
“…For predicting time-series data there are some popular methods, like exponential smoothing [39], autoregressive integrated moving average (ARIMA) [40], and neural networks [40,41]. In our previous research, an exponential smoothing algorithm was used to predict cyber-attacks from time-series data [13][14][15] using Microsoft Power BI implementation. However, in this study neural-network-based forecasting was implemented with Python code within a Microsoft Power BI environment.…”
mentioning
confidence: 99%