[HTML][HTML] Cyber Threat Intelligence on Blockchain: A Systematic Literature Review

D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …

[HTML][HTML] Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing

A Venčkauskas, V Jusas, D Barisas, B Misnevs - Applied Sciences, 2024 - mdpi.com
Sharing cyber threat intelligence (CTI) can significantly improve the security of information
technology (IT) in organizations. However, stakeholders and practitioners are not keen on …

Malware Threats Targeting Cryptocurrency: A Comparative Study

M Alauthman, A Al-Qerem… - … on Cyber Resilience …, 2024 - ieeexplore.ieee.org
As cryptocurrencies have grown in prevalence and value, associated malware threats have
rapidly emerged, exploiting vulnerabilities in wallets, markets, and decentralization …

A Democratically Anonymous and Trusted Architecture for CTI Sharing using Blockchain

K Dunnett, S Pal, Z Jadidi, GD Putra… - … and Networks (ICCCN …, 2022 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) sharing has become a significant issue with the increasing
number of cyberattacks. In CTI sharing, one entity (eg, an organisation or a user) intends to …

Granting Access Privileges Using OpenID Connect in Permissioned Distributed Ledgers

S Kakei, Y Shiraishi, S Saito - … Conference on Security and Privacy in …, 2022 - Springer
Permissioned distributed ledger technology (DLT), in which only authenticated entities
participate, assumes trust among the participants and implicit consent for data manipulation …