共 50 条
- [1] Risk Assessment of Sharing Cyber Threat Intelligence [J]. COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
- [2] Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence [J]. 2017 EUROPEAN INTELLIGENCE AND SECURITY INFORMATICS CONFERENCE (EISIC), 2017, : 91 - 98
- [3] A survey on cyber threat intelligence sharing based on Blockchain [J]. Advances in Computational Intelligence, 2023, 3 (3):
- [4] Sharing Susceptible Passwords as Cyber Threat Intelligence Feed [J]. 2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 767 - 772
- [7] Factors Amplifying or Inhibiting Cyber Threat Intelligence Sharing [J]. INFORMATION SYSTEMS, PT 2, EMCIS 2023, 2024, 502 : 204 - 214
- [9] Toward Automated Cyber Defense with Secure Sharing of Structured Cyber Threat Intelligence [J]. Information Systems Frontiers, 2021, 23 : 883 - 896
- [10] Data Sanitisation and Redaction for Cyber Threat Intelligence Sharing Platforms [J]. PROCEEDINGS OF THE 2021 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE (IEEE CSR), 2021, : 343 - 347