Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

Cloud-enabled prognosis for manufacturing

R Gao, L Wang, R Teti, D Dornfeld, S Kumara, M Mori… - CIRP annals, 2015 - Elsevier
Advanced manufacturing depends on the timely acquisition, distribution, and utilization of
information from machines and processes across spatial boundaries. These activities can …

A survey on blockchain: A game theoretical perspective

Z Liu, NC Luong, W Wang, D Niyato, P Wang… - IEEE …, 2019 - ieeexplore.ieee.org
Over the past decade, blockchain technology has attracted tremendous attention from both
academia and industry. The popularity of blockchains was originated from the concept of …

A survey on applications of game theory in blockchain

Z Liu, NC Luong, W Wang, D Niyato, P Wang… - arXiv preprint arXiv …, 2019 - arxiv.org
In the past decades, the blockchain technology has attracted tremendous attention from both
academia and industry. The popularity of blockchain networks was originated from a crypto …

[HTML][HTML] Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem

Z Rashid, U Noor, J Altmann - Future Generation Computer Systems, 2021 - Elsevier
Based on a comprehensive literature survey, the constructs of the cybersecurity information
sharing ecosystem have been defined in detail. Using this ecosystem, the interrelationships …

Interoperability challenges in the cybersecurity information sharing ecosystem

K Rantos, A Spyros, A Papanikolaou, A Kritsas… - Computers, 2020 - mdpi.com
Threat intelligence helps businesses and organisations make the right decisions in their
fight against cyber threats, and strategically design their digital defences for an optimised …

Cyber-all-intel: An ai for security related threat intelligence

S Mittal, A Joshi, T Finin - arXiv preprint arXiv:1905.02895, 2019 - arxiv.org
Keeping up with threat intelligence is a must for a security analyst today. There is a volume
of information present inthe wild'that affects an organization. We need to develop an artificial …

An evolutionary game-theoretic framework for cyber-threat information sharing

D Tosh, S Sengupta, C Kamhoua… - 2015 IEEE …, 2015 - ieeexplore.ieee.org
The initiative to protect against future cyber crimes requires a collaborative effort from all
types of agencies spanning industry, academia, federal institutions, and military agencies …

TIIA: A blockchain-enabled threat intelligence integrity audit scheme for IIoT

W Zhang, Y Bai, J Feng - Future Generation Computer Systems, 2022 - Elsevier
With the widespread deployment of the Industrial Internet of Things technology (IIoT), the
cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an …

Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …