A survey on technical threat intelligence in the age of sophisticated cyber attacks

W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …

Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

[HTML][HTML] Cybercrime threat intelligence: A systematic multi-vocal literature review

G Cascavilla, DA Tamburri, WJ Van Den Heuvel - Computers & Security, 2021 - Elsevier
Significant cybersecurity and threat intelligence analysts agree that online criminal activity is
increasing exponentially. To offer an overview of the techniques and indicators to perform …

TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data

J Zhao, Q Yan, J Li, M Shao, Z He, B Li - Computers & Security, 2020 - Elsevier
Security organizations increasingly rely on Cyber Threat Intelligence (CTI) sharing to
enhance resilience against cyber threats. However, its effectiveness remains dubious due to …

[PDF][PDF] The cyber security body of knowledge

D Basin - University of Bristol, ch. Formal Methods for, 2021 - cybok.org
The CyBOK project would like to understand how the CyBOK is being used and its uptake.
The project would like organisations using, or intending to use, CyBOK for the purposes of …

A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability'that needs to be fostered in information security practitioners and how this can be …

B Shin, PB Lowry - Computers & Security, 2020 - Elsevier
Given the global increase in crippling cyberattacks, organizations are increasingly turning to
cyberthreat intelligence (CTI). CTI represents actionable threat information that is relevant to …

A reference model for cyber threat intelligence (CTI) systems

G Sakellariou, P Fouliras, I Mavridis, P Sarigiannidis - Electronics, 2022 - mdpi.com
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with
many organizations investing in the development of proper tools and services and the …

[HTML][HTML] Understanding situation awareness in SOCs, a systematic literature review

HJ Ofte, S Katsikas - Computers & Security, 2023 - Elsevier
Situation awareness is shown through human factors research to be a valuable construct to
understand and improve how humans perform while operating complex systems in critical …

[HTML][HTML] Consolidating cybersecurity in Europe: A case study on job profiles assessment

CE Budde, A Karinsalo, S Vidor, J Salonen… - Computers & …, 2023 - Elsevier
To address the issue of educating and training new experts in cybersecurity, it is crucial to
identify the specific educational needs of the various professions that exist in the field. We …

Risk and the small-scale cyber security decision making dialogue—a UK case study

E Osborn, A Simpson - The Computer Journal, 2018 - ieeexplore.ieee.org
Despite a long-standing understanding that developments in personal and cloud computing
practices would change the way we approach security, small-scale IT users (SSITUs) remain …