MS Roobini, MB Chowdary, Y Srinivas… - 2024 Ninth …, 2024 - ieeexplore.ieee.org
To improve cybersecurity, cloud-based threat intelligence sharing for collective defense is essential. Organizations must work together to effectively detect and respond to the variety of …
N Mohammad - International Journal of Computer Applications …, 2022 - researchgate.net
Cloud computing has revolutionized the landscape of cybersecurity threat hunting and threat intelligence sharing, fostering a paradigm shift in data security practices. This article …
Collaborative defense and the exchange of threat intelligence have emerged as important weapons in the fight against cyber threats. Cooperation and the exchange of threat …
C Sauerwein, D Fischer, M Rubsamen… - Proceedings of the 16th …, 2021 - dl.acm.org
In the last couple of years, organizations have demonstrated an increasing willingness to share data, information and intelligence regarding emerging threats to collectively protect …
Cloud-hosted applications are prone to targeted attacks such as DDoS, advanced persistent threats, Cryptojacking which threaten service availability. Recently, methods for threat …
Cloud technologies have several merits including the elimination of cost incurred when traditional technologies are adopted. Despite the benefits, the cloud is still facing security …
The use of threat intelligence to improve the cybersecurity of organizations is on the rise. Cyberattacks are steadily increasing and becoming more sophisticated. Threat intelligence …
Threat intelligence sharing is an effective security control to develop situational awareness of the rapidly growing number of new, increasingly sophisticated and targeted cyber threats …
Cloud computing has become an essential component of enterprises and organizations globally in the current era of digital technology. The cloud has a multitude of advantages …