Open Access
| Issue |
ITM Web Conf.
Volume 81, 2026
International Conference on Emerging Technologies for Multidisciplinary Innovation and Sustainability (ETMIS 2025)
|
|
|---|---|---|
| Article Number | 01015 | |
| Number of page(s) | 10 | |
| DOI | https://doi.org/10.1051/itmconf/20268101015 | |
| Published online | 23 January 2026 | |
- Sharma, P., Prasad, J.S., Shaheen et al. An efficient cyber threat prediction using a novel artificial intelligence technique. Multimed Tools Appl 83, 66757–66773 (2024). https://doi.org/10.1007/s11042-024-18169-0 [Google Scholar]
- Zacharis, A., Katos, V. & Patsakis, C. Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle. Int. J. Inf. Secur. 23, 2691–2710 (2024). https://doi.org/10.1007/s10207-024-00860-w [Google Scholar]
- Arikkat, D.R., Vinod, P., Rafidha Rehiman, K.A. et al. XAITrafficIntell: Interpretable Cyber Threat Intelligence for Darknet Traffic Analysis. J Netw Syst Manage 32, 88 (2024). https://doi.org/10.1007/s10922-024-09842-8 [Google Scholar]
- Silvestri, S., Islam, S., Amelin, D. et al. Cyber threat assessment and management for securing healthcare ecosystems using natural language processing. Int. J. Inf. Secur. 23, 31–50 (2024). https://doi.org/10.1007/s10207-023-00769-w [Google Scholar]
- Ankan, S.M., Koçak, A. & Alkan, M. Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system. Int. J. Inf. Secur. 23, 3135–3151 (2024). https://doi.org/10.1007/s10207-024-00882-4 [Google Scholar]
- Papanikolaou, A., Alevizopoulos, A., Ilioudis, C. et al. An autoML network traffic analyzer for cyber threat detection. Int. J. Inf. Secur. 22, 1511–1530 (2023). https://doi.org/10.1007/s10207-023-00703-0 [Google Scholar]
- Gwassi, O.A.H., Uçan, O.N. & Navarro, E.A. Cyber-XAI-Block: an end-to-end cyber threat detection & fl-based risk assessment framework for iot enabled smart organization using xai and blockchain technologies. Multimed Tools Appl (2024). https://doi.org/10.1007/s11042-024-20059-4 [Google Scholar]
- AL-Essa, M., Andresini, G., Appice, A. et al. PANACEA: a neural model ensemble for cyber-threat detection. Mach Learn 113, 5379–5422 (2024). https://doi.org/10.1007/s10994-023-06470-2 [Google Scholar]
- Sangher, K.S., Singh, A. & Pandey, H.M. LSTM and BERT based transformers models for cyber threat intelligence for intent identification of social media platforms exploitation from darknet forums. Int. j. inf. tecnol. 16, 5277–5292 (2024). https://doi.org/10.1007/s41870-024-02077-5 [Google Scholar]
- Zhou, X., Almutairi, L., Alsenani, T.R. et al. Honeypot Based Industrial Threat Detection Using Game Theory in Cyber-Physical System. J Grid Computing 21, 59 (2023). https://doi.org/10.1007/s10723-023-09689-4 [Google Scholar]
- M, S., R S, P. An intelligent dynamic cyber physical system threat detection system for ensuring secured communication in 6G autonomous vehicle networks. Sci Rep 14, 20795 (2024). https://doi.org/10.1038/s41598-024-70835-3 [Google Scholar]
- Sarhan, M., Layeghy, S., Moustafa, N. et al. Cyber Threat Intelligence Sharing Scheme Based on Federated Learning for Network Intrusion Detection. J Netw Syst Manage 31, 3 (2023). https://doi.org/10.1007/s10922-022-09691-3 [Google Scholar]
- Yadav, S. Social botnets and the challenges of cyber situation awareness. AI Ethics (2024). https://doi.org/10.1007/s43681-024-00530-6 [Google Scholar]
- Dey, A.K., Gupta, G.P. & Sahu, S.P. BRL-ETDM: Bayesian reinforcement learning-based explainable threat detection model for industry 5.0 network. Cluster Comput 27, 8243–8268 (2024). https://doi.org/10.1007/s10586-024-04422-6 [Google Scholar]
- Haugli-Sandvik, M., Lund, M.S. & Bjorneseth, F.B. Maritime decision-makers and cyber security: deck officers' perception of cyber risks towards IT and OT systems. Int. J. Inf. Secur. 23, 1721–1739 (2024). https://doi.org/10.1007/s10207-023-00810-y [Google Scholar]
- Liu, J., Yan, J., Jiang, J. et al. TriCTI: an actionable cyber threat intelligence discovery system via trigger-enhanced neural network. Cybersecurity 5, 8 (2022). https://doi.org/10.1186/s42400-022-00110-3 [Google Scholar]
- Ashraf, M.W.A., Singh, A.R., Pandian, A. et al. A hybrid approach using support vector machine rule-based system: detecting cyber threats in internet of things. Sci Rep 14, 27058 (2024). https://doi.org/10.1038/s41598-024-78976-1 [Google Scholar]
- Zeghida, H., Boulaiche, M., Chikh, R. et al. Enhancing IoT cyber attacks intrusion detection through GAN-based data augmentation and hybrid deep learning models for MQTT network protocol cyber attacks. Cluster Comput 28, 58 (2025). https://doi.org/10.1007/s10586-024-04752-5 [Google Scholar]
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.

