[PDF][PDF] MANTRA: Towards a Conceptual Framework for Elevating Cybersecurity Applications Through Privacy-Preserving Cyber Threat Intelligence Sharing

P Fuxen, M Hachani, R Hackenberg… - CLOUD COMPUTING …, 2024 - researchgate.net
In light of the escalating cyber threat landscape, this paper highlights the critical importance
of Cyber Threat Intelligence while acknowledging the challenges that impede its effective …

[PDF][PDF] The Impact of Cloud Computing on Cybersecurity Threat Hunting and Threat Intelligence Sharing: Data Security, Data Sharing, and Collaboration

N Mohammad - International Journal of Computer Applications …, 2022 - researchgate.net
Cloud computing has revolutionized the landscape of cybersecurity threat hunting and threat
intelligence sharing, fostering a paradigm shift in data security practices. This article …

Development of a semantic-enabled cybersecurity threat intelligence sharing model

JS Mtsweni, NA Shozi, K Matenche, M Mutemwa… - 2016 - researchspace.csir.co.za
Big Data is transforming the global technological landscape by elevating online information
access required for addressing everyday challenges, such as detecting in real-time the …

[PDF][PDF] Threat Intelligence and Sharing for Collaborative Defense

N Panwar - kalaharijournals.com
Collaborative defense and the exchange of threat intelligence have emerged as important
weapons in the fight against cyber threats. Cooperation and the exchange of threat …

Harnessing the Power of Cloud-Based Technology to Foster an Integrated and Dynamic Platform for Sharing Threat Intelligence, thereby Strengthening Collective …

S Prabha, R Tharani, RC Yogitaadevi… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
In order to improve the sharing of threat intelligence and strengthen group defenses against
new cybersecurity concerns, this abstract investigates the possibility of cloud-based …

Data quality challenges and future research directions in threat intelligence sharing practice

C Sillaber, C Sauerwein, A Mussmann… - Proceedings of the 2016 …, 2016 - dl.acm.org
In the last couple of years, organizations have demonstrated an increased willingness to
participate in threat intelligence sharing platforms. The open exchange of information and …

Privacy preserving cyber threat information sharing and learning for cyber defense

S Badsha, I Vakilinia, S Sengupta - 2019 IEEE 9th Annual …, 2019 - ieeexplore.ieee.org
To secure cyber infrastructure against intentional and potentially malicious threats, a
growing collaborative effort between cybersecurity professionals and researchers from …

Luunu—blockchain, misp, model cards and federated learning enabled cyber threat intelligence sharing platform

E Bandara, S Shetty, R Mukkamala… - 2022 Annual …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is a process of threat data collection, processing, and
analysis to understand a threat actor's motives, targets, and attack behaviors. CTI involves …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

A distributed ledger for non-attributable cyber threat intelligence exchange

P Huff, Q Li - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over
adversaries by more quickly characterizing the threat, understanding its tactics, anticipating …