iShare: Blockchain-based privacy-aware multi-agent information sharing games for cybersecurity

DB Rawat, L Njilla, K Kwiat… - 2018 International …, 2018 - ieeexplore.ieee.org
In this paper, we design, develop, and evaluate a novel information sharing (iShare)
framework for cybersecurity with the goal of protecting confidential information and …

Establishing evolutionary game models for cyber security information exchange (cybex)

D Tosh, S Sengupta, CA Kamhoua, KA Kwiat - Journal of Computer and …, 2018 - Elsevier
The initiative to protect critical resources against cyber attacks requires security investments
complemented with a collaborative sharing effort from every organization. A CYBersecurity …

Mining threat intelligence about open-source projects and libraries from code repository issues and bug reports

L Neil, S Mittal, A Joshi - 2018 IEEE International Conference …, 2018 - ieeexplore.ieee.org
Open-Source Projects and Libraries are being used in software development while also
bearing multiple security vulnerabilities. This use of third party ecosystem creates a new kind …

Simulating ecosystem-level cybersecurity for the future generation of critical infrastructures: Exploring the impact of cyber-defensive strategies on critical infrastructures …

X de Ronde - 2018 - repository.tudelft.nl
The increased decentralisation and heterogeneity of critical infrastructure systems pose a
threat to the safe and secure operation of critical infrastructures by complicating …

Project Title: CYBEX Automation & Virtualization

A Parr - 2018 - scholarworks.unr.edu
Cybersecurity is an issue that affects virtually everybody in the digital age. Attacks such as
the Equifax breach or the Wannacry ransomware attack are becoming more and more …

[引用][C] MULTI-LEVEL ANALYSIS OF INITIATIVES IN COUNTERING BOTNETS

YN Imamverdiyev, GB Garayeva - Problems of information technology, 2018 - jpit.az
Botnet is a network of infected with malware and remotely controlled computers. In recent
years, rapid increase in the scale of botnets, their use in cybercrime purposes and tangible …