共 50 条
[21]
Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs
[J].
2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN),
2016,
[22]
Coeus: A Cyber Threat Intelligence Sharing Platform for Fraudulent Phone Numbers
[J].
2023 IST-AFRICA CONFERENCE, IST-AFRICA,
2023,
[23]
Blockchain-Based Model for Incentivized Cyber Threat Intelligence Sharing
[J].
APPLIED SCIENCES-BASEL,
2024, 14 (16)
[25]
E-EWS-based Governance Framework for Sharing Cyber Threat Intelligence in the Energy Sector
[J].
PROCEEDINGS OF THE 23RD EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY, ECCWS 2024,
2024, 23
:398-406
[26]
A Trusted, Verifiable and Differential Cyber Threat Intelligence Sharing Framework using Blockchain
[J].
2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM,
2022,
:1107-1114
[27]
Maximizing the benefits from sharing cyber threat intelligence by government agencies and departments
[J].
JOURNAL OF CYBERSECURITY,
2023, 9 (01)
[29]
Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange
[J].
DIGITAL THREATS: RESEARCH AND PRACTICE,
2022, 3 (01)
[30]
A New Network Model for Cyber Threat Intelligence Sharing Using Blockchain Technology
[J].
2019 10TH IFIP INTERNATIONAL CONFERENCE ON NEW TECHNOLOGIES, MOBILITY AND SECURITY (NTMS),
2019,