Data quality challenges and future research directions in threat intelligence sharing practice

C Sillaber, C Sauerwein, A Mussmann… - Proceedings of the 2016 …, 2016 - dl.acm.org
In the last couple of years, organizations have demonstrated an increased willingness to
participate in threat intelligence sharing platforms. The open exchange of information and …

Threat intelligence sharing platforms: An exploratory study of software vendors and research perspectives

C Sauerwein, C Sillaber, A Mussmann, R Breu - 2017 - aisel.aisnet.org
In the last couple of years, organizations have demonstrated an increased willingness to
exchange information and knowledge regarding vulnerabilities, threats, incidents and …

From cyber security information sharing to threat management

S Brown, J Gommers, O Serrano - … of the 2nd ACM workshop on …, 2015 - dl.acm.org
Across the world, organizations have teams gathering threat data to protect themselves from
incoming cyber attacks and maintain a strong cyber security posture. Teams are also …

How good is your data? Investigating the quality of data generated during security incident response investigations

G Grispos, WB Glisson, T Storer - arXiv preprint arXiv:1901.03723, 2019 - arxiv.org
An increasing number of cybersecurity incidents prompts organizations to explore
alternative security solutions, such as threat intelligence programs. For such programs to …

Distributed security framework for reliable threat intelligence sharing

D Preuveneers, W Joosen… - Security and …, 2020 - Wiley Online Library
Computer security incident response teams typically rely on threat intelligence platforms for
information about sightings of cyber threat events and indicators of compromise. Other …

[PDF][PDF] Towards an Evaluation Framework for Threat Intelligence Sharing Platforms.

S Bauer, D Fischer, C Sauerwein, S Latzel, D Stelzer… - HICSS, 2020 - core.ac.uk
Threat intelligence sharing is an important countermeasure against the increasing number
of security threats to which companies and governments are exposed. Its objective is the …

A novel trust taxonomy for shared cyber threat intelligence

TD Wagner, E Palomar, K Mahbub… - Security and …, 2018 - Wiley Online Library
Cyber threat intelligence sharing has become a focal point for many organizations to
improve resilience against cyberattacks. The objective lies in sharing relevant information …

What's in a cyber threat intelligence sharing platform? A mixed-methods user experience investigation of MISP

B Stojkovski, G Lenzini, V Koenig, S Rivas - Proceedings of the 37th …, 2021 - dl.acm.org
The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities
necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse …

A quantitative evaluation of trust in the quality of cyber threat intelligence sources

T Schaberreiter, V Kupfersberger, K Rantos… - Proceedings of the 14th …, 2019 - dl.acm.org
Threat intelligence sharing has become a cornerstone of cooperative and collaborative
cybersecurity. Sources providing such data have become more widespread in recent years …

Helping hands: Measuring the impact of a large threat intelligence sharing community

X Bouwman, V Le Pochat, P Foremski… - 31st USENIX Security …, 2022 - usenix.org
We tracked the largest volunteer security information sharing community known to date: the
COVID-19 Cyber Threat Coalition, with over 4,000 members. This enabled us to address …