A comparative study on cyber threat intelligence: The security incident response perspective

D Schlette, M Caselli, G Pernul - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …

[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

A reference model for cyber threat intelligence (CTI) systems

G Sakellariou, P Fouliras, I Mavridis, P Sarigiannidis - Electronics, 2022 - mdpi.com
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with
many organizations investing in the development of proper tools and services and the …

The nature of law

C de Silva - Galbraith's Construction and Land Management Law …, 2020 - taylorfrancis.com
Any society quickly finds that it needs rules or laws to enable it to function smoothly.
Consider the results if you had decided to drive to work today on the right instead of the left …

CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities

D Schlette, M Vielberth, G Pernul - Computers & Security, 2021 - Elsevier
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …

A success model for cyber threat intelligence management platforms

A Zibak, C Sauerwein, A Simpson - Computers & Security, 2021 - Elsevier
The increasingly persistent and sophisticated threat actors, along with the sheer speed at
which cyber attacks unfold, have made timely decision making imperative for ensuring the …

DEALER: decentralized incentives for threat intelligence reporting and exchange

F Menges, B Putz, G Pernul - International Journal of Information Security, 2021 - Springer
The exchange of threat intelligence information can make a significant contribution to
improving IT security in companies and has become increasingly important in recent years …

What's in a cyber threat intelligence sharing platform? A mixed-methods user experience investigation of MISP

B Stojkovski, G Lenzini, V Koenig, S Rivas - Proceedings of the 37th …, 2021 - dl.acm.org
The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities
necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse …

From threat data to actionable intelligence: an exploratory analysis of the intelligence cycle implementation in cyber threat intelligence sharing platforms

C Sauerwein, D Fischer, M Rubsamen… - Proceedings of the 16th …, 2021 - dl.acm.org
In the last couple of years, organizations have demonstrated an increasing willingness to
share data, information and intelligence regarding emerging threats to collectively protect …

Threat intelligence quality dimensions for research and practice

A Zibak, C Sauerwein, AC Simpson - Digital Threats: Research and …, 2022 - dl.acm.org
As the adoption and diversity of threat intelligence solutions continue to grow, questions
about their effectiveness, particularly in regards to the quality of the data they provide …