BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence

T Jiang, G Shen, C Guo, Y Cui, B Xie - Computer Networks, 2023 - Elsevier
Abstract Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …

Cybersecurity audits for emerging and existing cutting edge technologies

S Saravanan, A Menon, K Saravanan… - 2023 11th …, 2023 - ieeexplore.ieee.org
The evolution of cybersecurity insurance is spurred by financial institutions aiming to
manage costs from cyber incidents, particularly in the early stages like cloud-based services …

A blockchain-based access control scheme for zero trust cross-organizational data sharing

K Gai, Y She, L Zhu, KKR Choo, Z Wan - ACM Transactions on Internet …, 2023 - dl.acm.org
Multi-organization data sharing is becoming increasingly prevalent due to the
interconnectivity of systems and the need for collaboration across organizations (eg …

Leveraging a cloud-native architecture to enable semantic interconnectedness of data for cyber threat intelligence

M Ammi, O Adedugbe, FM Alharby, E Benkhelifa - Cluster Computing, 2022 - Springer
Cloud technologies have several merits including the elimination of cost incurred when
traditional technologies are adopted. Despite the benefits, the cloud is still facing security …

SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation

G Liu, Z Yan, W Feng, X Jing, Y Chen, M Atiquzzaman - Information Fusion, 2021 - Elsevier
In order to evaluate network trust, different intrusion detection methods have been proposed.
However, it is difficult for a single detection node to collect massive data and perform …

Preventing Critical Information framework against Cyber-Attacks using Cloud Computing and Big Data Analytics

V Talukdar, S Bothe, R Singh… - … and Informatics (IC3I …, 2022 - ieeexplore.ieee.org
The rapid development of cybersecurity insurance has been driven by the noticeably rising
expectations of financial firms to mitigate costs from cyber security. Hacking and fraud is just …

[HTML][HTML] A blockchain-based trust system for decentralised applications: When trustless needs trust

N Truong, GM Lee, K Sun, F Guitton, YK Guo - Future Generation …, 2021 - Elsevier
Blockchain technology has been envisaged to commence an era of decentralised
applications and services (DApps) without the need for a trusted intermediary. Such DApps …

Defense as a service cloud for cyber-physical systems

M Azab, M Eltoweissy - 7th International Conference on …, 2011 - ieeexplore.ieee.org
Modernizing our critical infrastructure often involves upgrades with Cyber-Physical Systems
(CPS) to enhance efficiency, safety and reliability. New security and resilience requirements …

A governance framework for mitigating risks and uncertainty in collaborative business processes

Z Su, F Biennier, WF Ouedraogo - Collaborative Networks in the Internet of …, 2012 - Springer
The development of collaborative business process relies mostly on software services
spanning multiple organizations. Therefore, uncertainty related to the shared assets and …

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing

F Skopik, G Settanni, R Fiedler - Computers & Security, 2016 - Elsevier
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …