Cyber threat intelligence sharing: Survey and research directions

TD Wagner, K Mahbub, E Palomar, AE Abdallah - Computers & Security, 2019 - Elsevier
Abstract Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal
of cyber defenders to proactively mitigate increasing cyber attacks. Automating the process …

Privacy principles for sharing cyber security data

G Fisk, C Ardi, N Pickett, J Heidemann… - 2015 IEEE Security …, 2015 - ieeexplore.ieee.org
Sharing cyber security data across organizational boundaries brings both privacy risks in the
exposure of personal information and data, and organizational risk in disclosing internal …

Blacklist ecosystem analysis: Spanning jan 2012 to jun 2014

L Metcalf, JM Spring - Proceedings of the 2nd ACM Workshop on …, 2015 - dl.acm.org
Motivation: We compare the contents of 86 Internet blacklists to provide a view of the whole
ecosystem of blocking network touch points and blacklists. We aim to formalize and evaluate …

CYRAN: A hybrid cyber range for testing security on ICS/SCADA systems

B Hallaq, A Nicholson, R Smith, L Maglaras… - Cyber Security and …, 2018 - igi-global.com
Abstract Cyber Security of ICS/SCADA systems is a major aspect of current research focus.
Cyber Ranges and Test-beds can serve as means of vulnerability and threat analysis of real …

Cybersecurity information exchange with privacy (cybex-p) and tahoe–a cyberthreat language

F Sadique - 2021 - search.proquest.com
Cybersecurity information sharing (CIS) is envisioned to protect organizations more
effectively from advanced cyberattacks. However, a completely automated CIS platform is …

Sequence generative adversarial network for long text summarization

H Xu, Y Cao, R Jia, Y Liu, J Tan - 2018 IEEE 30th international …, 2018 - ieeexplore.ieee.org
In this paper, we propose a new adversarial training framework for text summarization task.
Although sequence-to-sequence models have achieved state-of-the-art performance in …

A novel hybrid cyber range for security exercises on cyber-physical systems

B Hallaq, A Nicholson, R Smith, L Maglaras… - International Journal of …, 2021 - igi-global.com
Incident response teams cannot prepare for every situation or predict every crisis, especially
when they involve cyber-physical systems. As a result, training activities need to be provided …

Performance evaluation of client-based traffic sniffing for very large populations

P Roquero, E Magaña, R Leira, J Aracil - Computer Networks, 2020 - Elsevier
Current Internet users are demanding an increased mobility and service ubiquity, which, in
turns, requires that Internet services are provided from different datacenters in the cloud …

[PDF][PDF] DELIVERABLE D2. 5 “System Architecture: final version”

SB CNIT, A Conti, D Garlisi, D Orlando, AM Incelligent… - locus-project.eu
Short Abstract: The goal of this deliverable is to detail the reference architecture of LOCUS,
compliant with the system requirements and use-cases defined in Task 2.1 and based on …

[PDF][PDF] DELIVERABLE D5.

AC CNIT, D Garlisi, I Filippas, A Margaris, GS NEC… - locus-project.eu
Optimi deliverable Page 1 PROJECT “LOCUS”: LOCalization and analytics on-demand
embedded in the 5G ecosystem, for Ubiquitous vertical applicationS Grant Agreement …