A comparative study on cyber threat intelligence: The security incident response perspective

D Schlette, M Caselli, G Pernul - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …

A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing

F Skopik, G Settanni, R Fiedler - Computers & Security, 2016 - Elsevier
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …

[HTML][HTML] Economic model for evaluating the value creation through information sharing within the cybersecurity information sharing ecosystem

Z Rashid, U Noor, J Altmann - Future Generation Computer Systems, 2021 - Elsevier
Based on a comprehensive literature survey, the constructs of the cybersecurity information
sharing ecosystem have been defined in detail. Using this ecosystem, the interrelationships …

An analysis and classification of public information security data sources used in research and practice

C Sauerwein, I Pekaric, M Felderer, R Breu - Computers & security, 2019 - Elsevier
In order to counteract today's sophisticated and increasing number of cyber threats the
timely acquisition of information regarding vulnerabilities, attacks, threats, countermeasures …

ETIP: An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities

G González-Granadillo, M Faiella, I Medeiros… - Journal of Information …, 2021 - Elsevier
Abstract Open Source Intelligence (OSINT) data is collected by publicly available sources to
be used by intelligence contexts among which Threat Intelligence Platforms (TIPs) are the …

CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities

D Schlette, M Vielberth, G Pernul - Computers & Security, 2021 - Elsevier
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing

JM de Fuentes, L González-Manzano, J Tapiador… - computers & …, 2017 - Elsevier
Cooperative cyberdefense has been recognized as an essential strategy to fight against
cyberattacks. Cybersecurity Information Sharing (CIS), especially about threats and …

A collaborative cyber incident management system for European interconnected critical infrastructures

G Settanni, F Skopik, Y Shovgenya, R Fiedler… - Journal of Information …, 2017 - Elsevier
Abstract Today's Industrial Control Systems (ICSs) operating in critical infrastructures (CIs)
are becoming increasingly complex; moreover, they are extensively interconnected with …

Information sharing in cybersecurity: A review

A Pala, J Zhuang - Decision Analysis, 2019 - pubsonline.informs.org
In this survey, we review the cybersecurity information-sharing literature, categorizing the
identified papers based on their main focus and methodological approaches implemented to …

[PDF][PDF] Towards an Evaluation Framework for Threat Intelligence Sharing Platforms.

S Bauer, D Fischer, C Sauerwein, S Latzel, D Stelzer… - HICSS, 2020 - core.ac.uk
Threat intelligence sharing is an important countermeasure against the increasing number
of security threats to which companies and governments are exposed. Its objective is the …