Privacy-preserving and trusted threat intelligence sharing using distributed ledgers

H Ali, P Papadopoulos, J Ahmad… - … on Security of …, 2021 - ieeexplore.ieee.org
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the over-all security of trusted partners. Trusted partner organizations can …

[PDF][PDF] Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

H Ali, P Papadopoulos, J Ahmad, N Pitropakis… - academia.edu
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the overall security of trusted partners. Trusted partner organizations can provide …

[PDF][PDF] Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

H Ali, P Papadopoulos, J Ahmad, N Pitropakis… - researchgate.net
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the overall security of trusted partners. Trusted partner organizations can provide …

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

H Ali, P Papadopoulos, J Ahmad, N Pitropakis… - arXiv preprint arXiv …, 2021 - arxiv.org
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the overall security of trusted partners. Trusted partner organizations can provide …

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

H Ali, P Papadopoulos, J Ahmad, N Pit… - 2022 - napier-repository.worktribe.com
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the overall security of trusted partners. Trusted partner organizations can provide …

Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

H Ali, P Papadopoulos, J Ahmad, N Pitropakis… - arXiv e …, 2021 - ui.adsabs.harvard.edu
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the overall security of trusted partners. Trusted partner organizations can provide …

[PDF][PDF] Privacy-preserving and Trusted Threat Intelligence Sharing using Distributed Ledgers

H Ali, P Papadopoulos, J Ahmad, N Pitropakis… - napier-repository.worktribe.com
Threat information sharing is considered as one of the proactive defensive approaches for
enhancing the overall security of trusted partners. Trusted partner organizations can provide …