-
A Threat Intelligence Event Extraction Conceptual Model for Cyber Threat Intelligence Feeds
Authors:
Jamal H. Al-Yasiri,
Mohamad Fadli Bin Zolkipli,
Nik Fatinah N Mohd Farid,
Mohammed Alsamman,
Zainab Ali Mohammed
Abstract:
In response to the escalating cyber threats, the efficiency of Cyber Threat Intelligence (CTI) data collection has become paramount in ensuring robust cybersecurity. However, existing works encounter significant challenges in preprocessing large volumes of multilingual threat data, leading to inefficiencies in real-time threat analysis. This paper presents a systematic review of current techniques…
▽ More
In response to the escalating cyber threats, the efficiency of Cyber Threat Intelligence (CTI) data collection has become paramount in ensuring robust cybersecurity. However, existing works encounter significant challenges in preprocessing large volumes of multilingual threat data, leading to inefficiencies in real-time threat analysis. This paper presents a systematic review of current techniques aimed at enhancing CTI data collection efficiency. Additionally, it proposes a conceptual model to further advance the effectiveness of threat intelligence feeds. Following the PRISMA guidelines, the review examines relevant studies from the Scopus database, highlighting the critical role of artificial intelligence (AI) and machine learning models in optimizing CTI data preprocessing. The findings underscore the importance of AI-driven methods, particularly supervised and unsupervised learning, in significantly improving the accuracy of threat detection and event extraction, thereby strengthening cybersecurity. Furthermore, the study identifies a gap in the existing research and introduces XBC conceptual model integrating XLM-RoBERTa, BiGRU, and CRF, specifically developed to address this gap. This paper contributes conceptually to the field by providing a detailed analysis of current CTI data collection techniques and introducing an innovative conceptual model to enhance future threat intelligence capabilities.
△ Less
Submitted 4 June, 2025;
originally announced June 2025.
-
Cognitive Bias Detection Using Advanced Prompt Engineering
Authors:
Frederic Lemieux,
Aisha Behr,
Clara Kellermann-Bryant,
Zaki Mohammed
Abstract:
Cognitive biases, systematic deviations from rationality in judgment, pose significant challenges in generating objective content. This paper introduces a novel approach for real-time cognitive bias detection in user-generated text using large language models (LLMs) and advanced prompt engineering techniques. The proposed system analyzes textual data to identify common cognitive biases such as con…
▽ More
Cognitive biases, systematic deviations from rationality in judgment, pose significant challenges in generating objective content. This paper introduces a novel approach for real-time cognitive bias detection in user-generated text using large language models (LLMs) and advanced prompt engineering techniques. The proposed system analyzes textual data to identify common cognitive biases such as confirmation bias, circular reasoning, and hidden assumption. By designing tailored prompts, the system effectively leverages LLMs' capabilities to both recognize and mitigate these biases, improving the quality of human-generated content (e.g., news, media, reports). Experimental results demonstrate the high accuracy of our approach in identifying cognitive biases, offering a valuable tool for enhancing content objectivity and reducing the risks of biased decision-making.
△ Less
Submitted 7 March, 2025;
originally announced March 2025.
-
Diversity-By-Design for Dependable and Secure Cyber-Physical Systems: A Survey
Authors:
Qisheng Zhang,
Abdullah Zubair Mohammed,
Zelin Wan,
Jin-Hee Cho,
Terrence J. Moore
Abstract:
Diversity-based security approaches have been studied for several decades since the 1970's. The concept of diversity-by-design emerged in the 1980's and, since then, diversity-based system design research has been explored to build more secure and dependable systems. In this work, we are particularly interested in providing an in-depth, comprehensive survey of existing diversity-based approaches,…
▽ More
Diversity-based security approaches have been studied for several decades since the 1970's. The concept of diversity-by-design emerged in the 1980's and, since then, diversity-based system design research has been explored to build more secure and dependable systems. In this work, we are particularly interested in providing an in-depth, comprehensive survey of existing diversity-based approaches, insights, and future work directions for those who want to conduct research on developing secure and dependable cyber-physical systems (CPSs) using diversity as a system design feature. To be specific, this survey paper provides: (i) The common concept of diversity based on a multidisciplinary study of diversity from nine different fields along with the historical evolution of diversity-by-design for security; (ii) The design principles of diversity-based approaches; (iii) The key benefits and caveats of using diversity-by-design; (iv) The key concerns of CPS environments in introducing diversity-by-design; (v) A variety of existing diversity-based approaches based on five different classifications; (vi) The types of attacks mitigated by existing diversity-based approaches; (vii) The overall trends of evaluation methodologies used in diversity-based approaches, in terms of metrics, datasets, and testbeds; and (viii) The insights, lessons, and gaps identified from this extensive survey.
△ Less
Submitted 16 July, 2020;
originally announced July 2020.
-
Spotr: GPS Spoofing Detection via Device Fingerprinting
Authors:
Mahsa Foruhandeh,
Abdullah Z. Mohammed,
Gregor Kildow,
Paul Berges,
Ryan Gerdes
Abstract:
As the worlds predominant navigation system GPS is critical to modern life, finding applications in diverse areas like information security, healthcare, marketing, and power and water grid management. Unfortunately this diversification has only served to underscore the insecurity of GPS and the critical need to harden this system against manipulation and exploitation. A wide variety of attacks aga…
▽ More
As the worlds predominant navigation system GPS is critical to modern life, finding applications in diverse areas like information security, healthcare, marketing, and power and water grid management. Unfortunately this diversification has only served to underscore the insecurity of GPS and the critical need to harden this system against manipulation and exploitation. A wide variety of attacks against GPS have already been documented, both in academia and industry. Several defenses have been proposed to combat these attacks, but they are ultimately insufficient due to scope, expense, complexity, or robustness. With this in mind, we present our own solution: fingerprinting of GPS satellites. We assert that it is possible to create signatures, or fingerprints, of the satellites (more specifically their transmissions) that allow one to determine nearly instantly whether a received GPS transmission is authentic or not. Furthermore, in this paper we demonstrate that this solution detects all known spoofing attacks, that it does so while being fast, cheap, and simpler than previous solutions, and that it is highly robust with respect to environmental factors.
△ Less
Submitted 18 May, 2020;
originally announced May 2020.
-
On Generalized Optimal Hard Decision Fusion
Authors:
Fayazur Rahaman Mohammad,
Zafar Ali Khan Mohammed
Abstract:
In this letter, we formulate a generalized decision fusion problem (GDFP) for sensing with centralized hard decision fusion. We show that various new and existing decision fusion rules are special cases of the proposed GDFP. We then relate our problem to the classical $0-1$ Knapsack problem (KP). Consequently, we apply dynamic programming to solve the exponentially complex GDFP in polynomial time.…
▽ More
In this letter, we formulate a generalized decision fusion problem (GDFP) for sensing with centralized hard decision fusion. We show that various new and existing decision fusion rules are special cases of the proposed GDFP. We then relate our problem to the classical $0-1$ Knapsack problem (KP). Consequently, we apply dynamic programming to solve the exponentially complex GDFP in polynomial time. Numerical results are presented to verify the effectiveness of the proposed solution.
△ Less
Submitted 21 June, 2017;
originally announced July 2017.