Hamzic et al., 2025 - Google Patents
Enhancing cyber situational awareness with ai: A novel pipeline approach for threat intelligence analysis and enrichmentHamzic et al., 2025
View HTML- Document ID
- 6762939207254268537
- Author
- Hamzic D
- Skopik F
- Landauer M
- Wurzenberger M
- Rauber A
- Publication year
- Publication venue
- International Conference on Availability, Reliability and Security
External Links
Snippet
Abstract Cyber Situational Awareness (CSA) is crucial for understanding and anticipating developments across diverse domains. This paper introduces a novel approach employing advanced Artificial Intelligence (AI) and Natural Language Processing (NLP) techniques to …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
- G06F17/30864—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems
- G06F17/30867—Retrieval from the Internet, e.g. browsers by querying, e.g. search engines or meta-search engines, crawling techniques, push systems with filtering and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30386—Retrieval requests
- G06F17/30424—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
- G06F17/30587—Details of specialised database models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30705—Clustering or classification
- G06F17/3071—Clustering or classification including class or cluster creation or modification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/27—Automatic analysis, e.g. parsing
- G06F17/2765—Recognition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/20—Handling natural language data
- G06F17/21—Text processing
- G06F17/22—Manipulating or registering by use of codes, e.g. in sequence of text characters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/02—Knowledge representation
- G06N5/022—Knowledge engineering, knowledge acquisition
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Evangelista et al. | Systematic literature review to investigate the application of open source intelligence (OSINT) with artificial intelligence | |
| Goswami et al. | A survey of event detection techniques in online social networks | |
| Ghioni et al. | Open source intelligence and AI: a systematic review of the GELSI literature | |
| Middleton et al. | Geoparsing and geosemantics for social media: Spatiotemporal grounding of content propagating rumors to support trust and veracity analysis during breaking news | |
| Andrews et al. | Organised crime and social media: a system for detecting, corroborating and visualising weak signals of organised crime online | |
| Yin et al. | Digital forensics in the age of large language models | |
| Alturkistani et al. | Artificial intelligence and large language models in advancing cyber threat intelligence: A systematic literature review | |
| Li et al. | Cybersecurity knowledge graphs construction and quality assessment | |
| Jayaram et al. | AI-Driven Content Intelligence in Higher Education: Transforming Institutional Knowledge Management | |
| US20070113292A1 (en) | Automated rule generation for a secure downgrader | |
| Fernandez‐Basso et al. | An AI knowledge‐based system for police assistance in crime investigation | |
| Deka et al. | Attacker: towards enhancing cyber-attack attribution with a named entity recognition dataset | |
| Bäumer et al. | Towards authority-dependent risk identification and analysis in online networks | |
| Sonkor et al. | Using ChatGPT in construction projects: Unveiling its cybersecurity risks through a bibliometric analysis | |
| Gandhi | RAG-Driven Cybersecurity Intelligence: Leveraging Semantic Search for Improved Threat Detection | |
| Pradhan et al. | Getting the data in shape for your process mining analysis: An in-depth analysis of the pre-analysis stage | |
| Kucsván et al. | Inferring recovery steps from cyber threat intelligence reports | |
| Krishnamurthy et al. | Yours truly: A credibility framework for effortless LLM-powered fact checking | |
| Tanksale | Cyber threat hunting using large language models | |
| Di Martino et al. | Machine learning, big data analytics and natural language processing techniques with application to social media analysis for energy communities | |
| Hamzic et al. | Enhancing cyber situational awareness with ai: A novel pipeline approach for threat intelligence analysis and enrichment | |
| Aviad et al. | Cyber treat intelligence modeling | |
| Pastor et al. | Scanning of open data for detection of emerging organized crime threats—the ePOOLICE project | |
| Hassan et al. | Automation in Web Data Extraction: Opportunities, Challenges, and Ethical Considerations | |
| Chen et al. | EnhanceCTI: Enhanced semantic filtering and feature extraction framework for industry-specific cyber threat intelligence |