Cybex: The cybersecurity information exchange framework (x. 1500)

A Rutkowski, Y Kadobayashi, I Furey… - ACM SIGCOMM …, 2010 - dl.acm.org
The cybersecurity information exchange framework, known as CYBEX, is currently
undergoing its first iteration of standardization efforts within ITU-T. The framework describes …

Taxonomy model for cyber threat intelligence information exchange technologies

EW Burger, MD Goodman, P Kampanakis… - Proceedings of the 2014 …, 2014 - dl.acm.org
The cyber threat intelligence information exchange ecosystem is a holistic approach to the
automated sharing of threat intelligence. For automation to succeed, it must handle …

[PDF][PDF] The trusted automated exchange of indicator information (taxii)

J Connolly, M Davidson, C Schmidt - The MITRE Corporation, 2014 - taxii.mitre.org
Throughout the history of computing and cyber security, the sophistication, speed, and
impact of cyber attacks has grown. Today, nuisance-motivated virus outbreaks and internet …

On the sharing of cyber security information

E Luiijf, M Klaver - Critical Infrastructure Protection IX: 9th IFIP 11.10 …, 2015 - Springer
The sharing of cyber security information between organizations, both public and private,
and across sectors and borders is required to increase situational awareness, reduce …

Cyber defense technology networking and evaluation

R Bajcsy, T Benzel, M Bishop, B Braden… - Communications of the …, 2004 - dl.acm.org
Cyber defense technology networking and evaluation Page 1 A s the Internet has become
pervasive and our critical infrastructures have become inextricably tied to information systems …

Towards improved cyber security information sharing

L Dandurand, OS Serrano - 2013 5th International Conference …, 2013 - ieeexplore.ieee.org
There is a requirement for improved information sharing and automation in the cyber
security domain. Current practices and supporting technologies limit the ability of …

Building ontology of cybersecurity operational information

T Takahashi, H Fujiwara, Y Kadobayashi - Proceedings of the Sixth …, 2010 - dl.acm.org
Cyber threats come beyond the border of countries. However, most organizations are
currently coping with them individually without global collaboration mainly due to the lack of …

ISMS, security standards and security regulations

JS Broderick - information security technical report, 2006 - Elsevier
This article briefly describes the introduction and evolution of Information Security
Management Systems (ISMS), their application and the introduction of national and …

[PDF][PDF] Cybersecurity operations center

C Zimmerman - The MITRE Corporation, 2014 - dut.edu.ua
1.1 Background Ensuring the confidentiality, integrity, and availability of the modern
information technology (IT) enterprise is a big job. It incorporates many tasks, from robust …

Improving interdisciplinary communication with standardized cyber security terminology: a literature review

R Ramirez, N Choucri - IEEE Access, 2016 - ieeexplore.ieee.org
The growing demand for computer security, and the cyberization trend, are hallmarks of the
21st century. The rise in cyber-crime, digital currency, and e-governance has been well met …