共 50 条
- [22] Risk Assessment of Sharing Cyber Threat Intelligence [J]. COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 92 - 113
- [23] Semantic Ontologies for Cyber Threat Sharing Standards [J]. 2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
- [24] The Role of Cyber Threat Intelligence Sharing in the Metaverse [J]. IEEE Internet of Things Magazine, 2023, 6 (01): : 154 - 160
- [25] Sharing primary data: a threat or asset to discovery? [J]. Nature Reviews Neuroscience, 2002, 3 : 311 - 313
- [26] A Model for Automated Cybersecurity Threat Remediation and Sharing [J]. 2023 IEEE 9TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION, NETSOFT, 2023, : 492 - 497
- [27] Sharing primary data: a threat or asset to discovery? [J]. NATURE REVIEWS NEUROSCIENCE, 2002, 3 (04) : 311 - 313
- [28] QOI: ASSESSING PARTICIPATION IN THREAT INFORMATION SHARING [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2018, : 6951 - 6955
- [29] Overview of Threat Intelligence Sharing and Exchange in Cybersecurity [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2020, 57 (10): : 2052 - 2065
- [30] Visual Secret Sharing for Copyright Protection and Authentication of Color Images [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON ROBOT, VISION AND SIGNAL PROCESSING (RVSP), 2015, : 151 - 154