{"id":"https://openalex.org/W3171687382","doi":"https://doi.org/10.1109/access.2021.3087109","title":"Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security","display_name":"Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security","publication_year":2021,"publication_date":"2021-01-01","ids":{"openalex":"https://openalex.org/W3171687382","doi":"https://doi.org/10.1109/access.2021.3087109","mag":"3171687382"},"language":"en","primary_location":{"id":"doi:10.1109/access.2021.3087109","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3087109","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09448097.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09448097.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072933616","display_name":"Abel Yeboah-Ofori","orcid":"https://orcid.org/0000-0001-8055-9274"},"institutions":[{"id":"https://openalex.org/I177463362","display_name":"University of West London","ror":"https://ror.org/03e5mzp60","country_code":"GB","type":"education","lineage":["https://openalex.org/I177463362"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Abel Yeboah-Ofori","raw_affiliation_strings":["University of West London, Ealing London, U.K"],"raw_orcid":"https://orcid.org/0000-0001-8055-9274","affiliations":[{"raw_affiliation_string":"University of West London, Ealing London, U.K","institution_ids":["https://openalex.org/I177463362"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5058734055","display_name":"Shareeful Islam","orcid":"https://orcid.org/0000-0003-0885-1881"},"institutions":[{"id":"https://openalex.org/I157227730","display_name":"University of East London","ror":"https://ror.org/057jrqr44","country_code":"GB","type":"education","lineage":["https://openalex.org/I157227730"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shareeful Islam","raw_affiliation_strings":["School of Architecture Computing and Engineering (ACE), University of East London, London, U.K"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Architecture Computing and Engineering (ACE), University of East London, London, U.K","institution_ids":["https://openalex.org/I157227730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078442086","display_name":"Sin Wee Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I157227730","display_name":"University of East London","ror":"https://ror.org/057jrqr44","country_code":"GB","type":"education","lineage":["https://openalex.org/I157227730"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sin Wee Lee","raw_affiliation_strings":["School of Architecture Computing and Engineering (ACE), University of East London, London, U.K"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Architecture Computing and Engineering (ACE), University of East London, London, U.K","institution_ids":["https://openalex.org/I157227730"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000695312","display_name":"Zia Ush Shamszaman","orcid":"https://orcid.org/0000-0003-1954-1950"},"institutions":[{"id":"https://openalex.org/I874055015","display_name":"Teesside University","ror":"https://ror.org/03z28gk75","country_code":"GB","type":"education","lineage":["https://openalex.org/I874055015"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Zia Ush Shamszaman","raw_affiliation_strings":["Teesside University, Middlesbrough, U.K"],"raw_orcid":"https://orcid.org/0000-0003-1954-1950","affiliations":[{"raw_affiliation_string":"Teesside University, Middlesbrough, U.K","institution_ids":["https://openalex.org/I874055015"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018267985","display_name":"Khan Muhammad","orcid":"https://orcid.org/0000-0002-5302-1150"},"institutions":[{"id":"https://openalex.org/I848706","display_name":"Sungkyunkwan University","ror":"https://ror.org/04q78tk20","country_code":"KR","type":"education","lineage":["https://openalex.org/I848706"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Khan Muhammad","raw_affiliation_strings":["Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0002-5302-1150","affiliations":[{"raw_affiliation_string":"Visual Analytics for Knowledge Laboratory (VIS2KNOW Lab), School of Convergence, College of Computing and Informatics, Sungkyunkwan University, Seoul, South Korea","institution_ids":["https://openalex.org/I848706"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072018895","display_name":"Meteb Altaf","orcid":"https://orcid.org/0000-0002-3256-3233"},"institutions":[{"id":"https://openalex.org/I1284598098","display_name":"King Abdulaziz City for Science and Technology","ror":"https://ror.org/05tdz6m39","country_code":"SA","type":"facility","lineage":["https://openalex.org/I1284598098"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Meteb Altaf","raw_affiliation_strings":["Advanced Manufacturing and Industry 4.0 Center, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0002-3256-3233","affiliations":[{"raw_affiliation_string":"Advanced Manufacturing and Industry 4.0 Center, King Abdulaziz City for Science and Technology, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I1284598098"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5017023860","display_name":"Mabrook Al\u2010Rakhami","orcid":"https://orcid.org/0000-0001-5343-8370"},"institutions":[{"id":"https://openalex.org/I28022161","display_name":"King Saud University","ror":"https://ror.org/02f81g417","country_code":"SA","type":"education","lineage":["https://openalex.org/I28022161"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Mabrook S. Al-Rakhami","raw_affiliation_strings":["College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"],"raw_orcid":"https://orcid.org/0000-0001-5343-8370","affiliations":[{"raw_affiliation_string":"College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia","institution_ids":["https://openalex.org/I28022161"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5072933616"],"corresponding_institution_ids":["https://openalex.org/I177463362"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":10.2505,"has_fulltext":true,"cited_by_count":99,"citation_normalized_percentile":{"value":0.98546695,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":"9","issue":null,"first_page":"94318","last_page":"94337"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/ransomware","display_name":"Ransomware","score":0.8428094983100891},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7621406316757202},{"id":"https://openalex.org/keywords/compromise","display_name":"Compromise","score":0.7496587634086609},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7300164699554443},{"id":"https://openalex.org/keywords/supply-chain","display_name":"Supply chain","score":0.6671082973480225},{"id":"https://openalex.org/keywords/malware","display_name":"Malware","score":0.656640887260437},{"id":"https://openalex.org/keywords/cyber-attack","display_name":"Cyber-attack","score":0.5943652391433716},{"id":"https://openalex.org/keywords/predictive-analytics","display_name":"Predictive analytics","score":0.48955783247947693},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.4630667567253113},{"id":"https://openalex.org/keywords/command-and-control","display_name":"Command and control","score":0.4527776539325714},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.4229260981082916},{"id":"https://openalex.org/keywords/decision-tree","display_name":"Decision tree","score":0.4103175699710846},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4043216109275818},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.2063879370689392},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.20453673601150513},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1471354365348816},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1457761824131012}],"concepts":[{"id":"https://openalex.org/C2777667771","wikidata":"https://www.wikidata.org/wiki/Q926331","display_name":"Ransomware","level":3,"score":0.8428094983100891},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7621406316757202},{"id":"https://openalex.org/C46355384","wikidata":"https://www.wikidata.org/wiki/Q726686","display_name":"Compromise","level":2,"score":0.7496587634086609},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7300164699554443},{"id":"https://openalex.org/C108713360","wikidata":"https://www.wikidata.org/wiki/Q1824206","display_name":"Supply chain","level":2,"score":0.6671082973480225},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.656640887260437},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.5943652391433716},{"id":"https://openalex.org/C83209312","wikidata":"https://www.wikidata.org/wiki/Q1053367","display_name":"Predictive analytics","level":2,"score":0.48955783247947693},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.4630667567253113},{"id":"https://openalex.org/C506615639","wikidata":"https://www.wikidata.org/wiki/Q21662260","display_name":"Command and control","level":2,"score":0.4527776539325714},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.4229260981082916},{"id":"https://openalex.org/C84525736","wikidata":"https://www.wikidata.org/wiki/Q831366","display_name":"Decision tree","level":2,"score":0.4103175699710846},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4043216109275818},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2063879370689392},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.20453673601150513},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1471354365348816},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1457761824131012},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/access.2021.3087109","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3087109","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09448097.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:repository.uwl.ac.uk:8016","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306402477","display_name":"UWL Repository (University of West London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177463362","host_organization_name":"University of West London","host_organization_lineage":["https://openalex.org/I177463362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":null},{"id":"pmh:oai:repository.uwl.ac.uk:8016","is_oa":false,"landing_page_url":"https://orcid.org/0000-0001-8055-9274","pdf_url":null,"source":{"id":"https://openalex.org/S4306402477","display_name":"UWL Repository (University of West London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I177463362","host_organization_name":"University of West London","host_organization_lineage":["https://openalex.org/I177463362"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},{"id":"pmh:oai:repository.uel.ac.uk:89q03","is_oa":true,"landing_page_url":"https://doi.org/10.1109/ACCESS.2021.3087109","pdf_url":"https://repository.uel.ac.uk/download/611c6f8b69702f357c67c992cf92d14438cc7cbce2424301b904c808c5c03dc5/2906651/Cyber_Threat_Predictive_Analytics_for_Improving_Cyber_Supply_Chain_Security.pdf","source":{"id":"https://openalex.org/S4306401301","display_name":"UEL Research Repository (University of East London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I157227730","host_organization_name":"University of East London","host_organization_lineage":["https://openalex.org/I157227730"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:57198d754d884f368d4b614eefe8f5a0","is_oa":true,"landing_page_url":"https://doaj.org/article/57198d754d884f368d4b614eefe8f5a0","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 9, Pp 94318-94337 (2021)","raw_type":"article"},{"id":"pmh:oai:https://research.tees.ac.uk/ws/oai:openaire/afc31516-4d91-49be-8fdf-bec90069f9af","is_oa":true,"landing_page_url":"https://research.tees.ac.uk/en/publications/afc31516-4d91-49be-8fdf-bec90069f9af","pdf_url":null,"source":{"id":"https://openalex.org/S4306401198","display_name":"TeesRep (Teesside University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I874055015","host_organization_name":"Teesside University","host_organization_lineage":["https://openalex.org/I874055015"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Yeboah-Ofori, A, Islam, S, Lee, S W, Shamszaman, Z U, Muhammad, K, Altaf, M & Al-Rakhami, M S 2021, 'Cyber Threat Predictive Analytics for Improving Cyber Supply Chain Security', IEEE Access, vol. 9, 9448097, pp. 94318-94337. https://doi.org/10.1109/ACCESS.2021.3087109","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2021.3087109","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2021.3087109","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/9312710/09448097.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.47999998927116394}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321145","display_name":"King Saud University","ror":"https://ror.org/02f81g417"},{"id":"https://openalex.org/F4320335726","display_name":"Deanship of Scientific Research, King Saud University","ror":null}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3171687382.pdf","grobid_xml":"https://content.openalex.org/works/W3171687382.grobid-xml"},"referenced_works_count":29,"referenced_works":["https://openalex.org/W243298746","https://openalex.org/W1977555035","https://openalex.org/W2116065935","https://openalex.org/W2119821739","https://openalex.org/W2219268883","https://openalex.org/W2342408547","https://openalex.org/W2479743319","https://openalex.org/W2601682974","https://openalex.org/W2726910570","https://openalex.org/W2783664444","https://openalex.org/W2800348009","https://openalex.org/W2809790149","https://openalex.org/W2902300776","https://openalex.org/W2919469235","https://openalex.org/W2920829056","https://openalex.org/W2947429623","https://openalex.org/W3004036452","https://openalex.org/W3016062171","https://openalex.org/W3016154938","https://openalex.org/W3047838906","https://openalex.org/W3081084674","https://openalex.org/W3081325334","https://openalex.org/W3099682118","https://openalex.org/W3112343206","https://openalex.org/W3186276894","https://openalex.org/W3197087250","https://openalex.org/W4212865065","https://openalex.org/W4239510810","https://openalex.org/W6644555907"],"related_works":["https://openalex.org/W3201228709","https://openalex.org/W2922354075","https://openalex.org/W4389157351","https://openalex.org/W4253977752","https://openalex.org/W2964829536","https://openalex.org/W3120595989","https://openalex.org/W3156953641","https://openalex.org/W2784028699","https://openalex.org/W2938164997","https://openalex.org/W2218014804"],"abstract_inverted_index":{"Cyber":[0,79,131],"Supply":[1],"Chain":[2],"(CSC)":[3],"system":[4,32],"is":[5,18,57,181],"complex":[6],"which":[7,33],"involves":[8],"different":[9],"sub-systems":[10],"performing":[11],"various":[12,94],"tasks.":[13],"Security":[14],"in":[15,252],"supply":[16,42,76,125],"chain":[17,77,126],"challenging":[19],"due":[20],"to":[21,60,87,90,117,122,140,153,206,238,260],"the":[22,31,41,51,64,75,144,148,155,168,174,211,239,248,270,275],"inherent":[23,156],"vulnerabilities":[24,158,226],"and":[25,62,100,104,107,109,119,142,183,200,220,225,227,244],"threats":[26,65,92,121,145,251],"from":[27],"any":[28,38],"part":[29],"of":[30,111,176,186,229],"can":[34,45,69,164],"be":[35,165],"exploited":[36],"at":[37],"point":[39],"within":[40],"chain.":[43],"This":[44,114],"cause":[46],"a":[47,184],"severe":[48],"disruption":[49],"on":[50,147],"overall":[52,169,276],"business":[53],"continuity.":[54],"Therefore,":[55],"it":[56],"paramount":[58],"important":[59],"understand":[61],"predicate":[63,120,272],"so":[66,159],"that":[67,160,242],"organization":[68],"undertake":[70],"necessary":[71],"control":[72,162],"measures":[73],"for":[74,167,269,274],"security.":[78,127],"Threat":[80,132],"Intelligence":[81,133],"(CTI)":[82,134],"provides":[83],"an":[84],"intelligence":[85],"analysis":[86],"discover":[88],"unknown":[89],"known":[91],"using":[93,210,266],"properties":[95],"including":[96],"threat":[97],"actor":[98],"skill":[99],"motivation,":[101],"Tactics,":[102],"Techniques,":[103],"Procedure":[105],"(TT":[106],"P),":[108],"Indicator":[110],"Compromise":[112],"(IoC).":[113],"paper":[115],"aims":[116],"analyse":[118,141],"improve":[123],"cyber":[124,278],"We":[128,254,264],"have":[129,255],"applied":[130],"with":[135],"Machine":[136,195],"Learning":[137],"(ML)":[138],"techniques":[139],"predict":[143],"based":[146],"CTI":[149,179,267],"properties.":[150],"That":[151],"allows":[152],"identify":[154],"CSC":[157,277],"appropriate":[161],"actions":[163],"undertaken":[166],"cybersecurity":[170],"improvement.":[171,280],"To":[172],"demonstrate":[173],"applicability":[175],"our":[177],"approach,":[178],"data":[180,268],"gathered":[182],"number":[185],"ML":[187,271],"algorithms,":[188],"i.e.,":[189],"Logistic":[190],"Regression":[191],"(LG),":[192],"Support":[193],"Vector":[194],"(SVM),":[196],"Random":[197],"Forest":[198],"(RF),":[199],"Decision":[201],"Tree":[202],"(DT),":[203],"are":[204,247],"used":[205],"develop":[207],"predictive":[208],"analytics":[209],"Microsoft":[212],"Malware":[213],"Prediction":[214],"dataset.":[215],"The":[216,235],"experiment":[217],"considers":[218],"attack":[219],"TTP":[221],"as":[222,232],"input":[223],"parameters":[224],"Indicators":[228],"compromise":[230],"(IoC)":[231],"output":[233],"parameters.":[234],"results":[236],"relating":[237],"prediction":[240],"reveal":[241],"Spyware/Ransomware":[243],"spear":[245],"phishing":[246],"most":[249],"predictable":[250],"CSC.":[253],"also":[256],"recommended":[257],"relevant":[258],"controls":[259],"tackle":[261],"these":[262],"threats.":[263],"advocate":[265],"model":[273],"security":[279]},"counts_by_year":[{"year":2026,"cited_by_count":5},{"year":2025,"cited_by_count":30},{"year":2024,"cited_by_count":27},{"year":2023,"cited_by_count":19},{"year":2022,"cited_by_count":14},{"year":2021,"cited_by_count":4}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
