[HTML][HTML] Blockchain for secure and decentralized artificial intelligence in cybersecurity: A comprehensive review

AMS Saleh - Blockchain: Research and Applications, 2024 - Elsevier
As the usage of artificial intelligence (AI) grows within the field of cybersecurity, so too does
the demand for secure and decentralized AI systems to protect against potential cyber …

The nature of law

C de Silva - Galbraith's Construction and Land Management Law …, 2020 - taylorfrancis.com
Any society quickly finds that it needs rules or laws to enable it to function smoothly.
Consider the results if you had decided to drive to work today on the right instead of the left …

[HTML][HTML] Current approaches and future directions for Cyber Threat Intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

Sharing is caring: Hurdles and prospects of open, crowd-sourced cyber threat intelligence

V Jesus, B Bains, V Chang - IEEE Transactions on Engineering …, 2023 - ieeexplore.ieee.org
Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity but
it remains an area showing silos and reserved for large organizations. For an area whose …

Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus

D Chatziamanetoglou, K Rantos - Security and Communication …, 2023 - Wiley Online Library
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is
collected, processed, analysed, and disseminated to the right audience, in order to …

Autonomous Threat Hunting: A Future Paradigm for AI-Driven Threat Intelligence

SR Sindiramutty - arXiv preprint arXiv:2401.00286, 2023 - arxiv.org
The evolution of cybersecurity has spurred the emergence of autonomous threat hunting as
a pivotal paradigm in the realm of AI-driven threat intelligence. This review navigates …

Decentralized actionable cyber threat intelligence for networks and the internet of things

D Mendez Mena, B Yang - IoT, 2020 - mdpi.com
Security presents itself as one of the biggest threats to the enabling and the deployment of
the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity …

A survey on cyber threat intelligence sharing based on Blockchain

A El-Kosairy, N Abdelbaki, H Aslan - Advances in Computational …, 2023 - Springer
In recent years, cyber security attacks have increased massively. This introduces the need to
defend against such attacks. Cyber security threat intelligence has recently been introduced …

[HTML][HTML] An automated dynamic quality assessment method for cyber threat intelligence

L Yang, M Wang, W Lou - Computers & Security, 2024 - Elsevier
The emergence of cyber threat intelligence (CTI) is a promising approach for alleviating
malicious activities. However, the effectiveness of CTIs is heavily dependent on their quality …

[HTML][HTML] SPM-SeCTIS: Severity pattern matching for secure computable threat information sharing in intelligent additive manufacturing

M Kumar, G Epiphaniou, C Maple - Internet of Things, 2024 - Elsevier
Abstract Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to
defend against cyberattacks. However, current methods often fail to adequately protect …