共 50 条
- [31] A Comprehensive Dynamic Quality Assessment Method for Cyber Threat Intelligence [J]. 52ND ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOP VOLUME (DSN-W 2022), 2022, : 178 - 181
- [32] Barriers to Adopting Interoperability Standards for Cyber Threat Intelligence Sharing: An Exploratory Study [J]. INTELLIGENT COMPUTING, VOL 2, 2019, 857 : 666 - 684
- [33] Privacy-Preserving Polyglot Sharing and Analysis of Confidential Cyber Threat Intelligence [J]. PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, ARES 2022, 2022,
- [34] A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 1107 - 1114
- [35] A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS AND OTHER AFFILIATED EVENTS (PERCOM WORKSHOPS), 2022,
- [36] Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments [J]. JOURNAL OF CYBERSECURITY, 2023, 9 (01):
- [38] A New Network Model for Cyber Threat Intelligence Sharing Using Blockchain Technology [J]. 2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS), 2019,
- [39] Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance [J]. GAME THEORY FOR NETWORKS (GAMENETS 2017), 2017, 212 : 154 - 164
- [40] Modeling Cyber Threat Intelligence [J]. ICISSP: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2020, : 273 - 280