<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Arvid Kok</style></author><author><style face="normal" font="default" size="100%">Ivana Ilic Mestric</style></author><author><style face="normal" font="default" size="100%">Giavid Valiyev</style></author><author><style face="normal" font="default" size="100%">Michael Street</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Threat Prediction with Machine Learning</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">auto-encoding</style></keyword><keyword><style  face="normal" font="default" size="100%">clustering with outliers</style></keyword><keyword><style  face="normal" font="default" size="100%">Cybersecurity</style></keyword><keyword><style  face="normal" font="default" size="100%">DBSCAN</style></keyword><keyword><style  face="normal" font="default" size="100%">deep learning</style></keyword><keyword><style  face="normal" font="default" size="100%">KNIME Analytics Platform</style></keyword><keyword><style  face="normal" font="default" size="100%">machine learning</style></keyword><keyword><style  face="normal" font="default" size="100%">MITRE ATT@CK framework</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2020</style></year><pub-dates><date><style  face="normal" font="default" size="100%">2020</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">47</style></volume><pages><style face="normal" font="default" size="100%">203-220</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">In this paper we address the approaches, techniques and results of applying machine learning techniques for cyber threat prediction. Timely discovery of advanced persistent threats is of utmost importance for the protection of NATO’s and its allies’ networks. Therefore, NATO and NATO Communication and Information Agency’s Cyber Security service line is constantly looking for improvements. During Coalition Warrior Interoperability Exercise (CWIX) event data was captured on a Red-Blue Team Simulation. The data set was then used to apply a variety of Machine Learning techniques: deep-learning, auto-encoding and clustering with outliers.</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">203</style></section></record></records></xml>