W Li, Y Wang, J Li, MH Au - International Journal of Information Security, 2021 - Springer
Network intrusions are a big threat to network and system assets, which have become more complex to date. To enhance the detection performance, collaborative intrusion detection …
L Shi, T Wang, Z Xiong, Z Wang, Y Liu, J Li - IEEE Network, 2024 - ieeexplore.ieee.org
As a shared and distributed database, blockchain empowers distributed edge computing (EC) networks with decentralization, integrity, and auditability of trust management …
D Preuveneers, W Joosen - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about cyber attacks to help organizations gain a better understanding of threats and proactively …
In the last couple of years, organizations have demonstrated an increased willingness to exchange information and knowledge regarding vulnerabilities, threats, incidents and …
Blockchain technology promises to revolutionize manufacturing industries. For example, several supply chain use cases may benefit from transparent asset tracking and automated …
Mentoring and stakeholders' assessment are easier with business sector monitoring and remediation solutions. They also risk computer hacking for stakeholders. The “general …
Á MacDermott, Q Shi, K Kifayat - … , ICIC 2017, Liverpool, UK, August 7-10 …, 2017 - Springer
This paper details a robust collaborative intrusion detection methodology for detecting attacks within a Cloud federation. It is a proactive model and the responsibility for managing …
The blockchain technology has been used for recording state transitions of smart contracts- decentralized applications that can be invoked through external transactions. Smart …