[PDF][PDF] Threat Intelligence and Sharing for Collaborative Defense

N Panwar - kalaharijournals.com
Collaborative defense and the exchange of threat intelligence have emerged as important
weapons in the fight against cyber threats. Cooperation and the exchange of threat …

A distributed ledger for non-attributable cyber threat intelligence exchange

P Huff, Q Li - Security and Privacy in Communication Networks: 17th …, 2021 - Springer
Cyber threat intelligence (CTI) sharing provides cybersecurity operations an advantage over
adversaries by more quickly characterizing the threat, understanding its tactics, anticipating …

Data quality challenges and future research directions in threat intelligence sharing practice

C Sillaber, C Sauerwein, A Mussmann… - Proceedings of the 2016 …, 2016 - dl.acm.org
In the last couple of years, organizations have demonstrated an increased willingness to
participate in threat intelligence sharing platforms. The open exchange of information and …

Uncovering Critical Resources and Factors Influencing the Use of Threat Intelligence Sharing Platforms

C Sauerwein, C Wenzl, R Breu - 2024 - scholarspace.manoa.hawaii.edu
Threat intelligence sharing is an effective security control to develop situational awareness
of the rapidly growing number of new, increasingly sophisticated and targeted cyber threats …

Harnessing the Power of Cloud-Based Technology to Foster an Integrated and Dynamic Platform for Sharing Threat Intelligence, thereby Strengthening Collective …

S Prabha, R Tharani, RC Yogitaadevi… - 2024 3rd International …, 2024 - ieeexplore.ieee.org
In order to improve the sharing of threat intelligence and strengthen group defenses against
new cybersecurity concerns, this abstract investigates the possibility of cloud-based …

A novel trust taxonomy for shared cyber threat intelligence

TD Wagner, E Palomar, K Mahbub… - Security and …, 2018 - Wiley Online Library
Cyber threat intelligence sharing has become a focal point for many organizations to
improve resilience against cyberattacks. The objective lies in sharing relevant information …

From cyber security information sharing to threat management

S Brown, J Gommers, O Serrano - … of the 2nd ACM workshop on …, 2015 - dl.acm.org
Across the world, organizations have teams gathering threat data to protect themselves from
incoming cyber attacks and maintain a strong cyber security posture. Teams are also …

Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives

C Sauerwein, C Sillaber, A Mussmann, R Breu - 2017 - aisel.aisnet.org
In the last couple of years, organizations have demonstrated an increased willingness to
exchange information and knowledge regarding vulnerabilities, threats, incidents and …

[PDF][PDF] Cyber Threat Intelligence Sharing Platforms: A Comprehensive Analysis of Software Vendors and Research Perspectives

C Sauerwein, T Staiger - diglib.uibk.ac.at
The use of threat intelligence to improve the cybersecurity of organizations is on the rise.
Cyberattacks are steadily increasing and becoming more sophisticated. Threat intelligence …

Collaborative Analysis of Cybersecurity Information Sharing

I Vakilinia - 2019 - search.proquest.com
As the complexity and number of cybersecurity incidents are growing, the traditional security
measures are not enough to defend against attackers. In this situation, cyber threat …