Journal ArticleDOI
A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing
TLDR
A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.Citations
More filters
Book ChapterDOI
Digital Twins for Precision Healthcare
Gabriela Ahmadi-Assalemi,Haider Al-Khateeb,Carsten Maple,Gregory Epiphaniou,Zhraa A. Alhaboby,Sultan Alkaabi,Doaa Alhaboby +6 more
TL;DR: The role of DT to achieve precision healthcare, proposed frameworks, the value of active participation and continuous monitoring, and the cyber-security challenges and ethical implications for this emerging paradigm are discussed.
Journal ArticleDOI
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing
TL;DR: PRACIS is introduced, a scheme for CIS networks that guarantees private data forwarding and aggregation and can be seamlessly integrated with existing STIX-based message brokering middleware such as publish-subscribe architectures, by combining standard format-preserving and homomorphic encryption primitives.
Journal ArticleDOI
Cybercrime threat intelligence: A systematic multi-vocal literature review
TL;DR: A systematic literature review shows the dimensions of risk assessment techniques today available for the surface, deep, and darknets areas and what website features should be used in order to identify a cyber threat or attack.
Journal ArticleDOI
A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished
Bongsik Shin,Paul Benjamin Lowry +1 more
TL;DR: The CTI capability model (CTI-CM) is proposed to prescribe the key capabilities necessary for a CTI practitioner to engage effectively in CTI activities and explains how these capabilities can be fostered, and the key implications for leading security practice in organizations.
Journal ArticleDOI
A collaborative cyber incident management system for European interconnected critical infrastructures
Giuseppe Settanni,Florian Skopik,Yegor Shovgenya,Roman Fiedler,Mark Carolan,Damien Conroy,Konstantin Boettinger,Mark Gall,Gerd Stefan Brost,Christophe Ponchel,Mirko Haustein,Helmut Kaufmann,Klaus Theuerkauf,Pia Olli +13 more
TL;DR: This paper proposes a system architecture for a National SOC, defining the functional components and interfaces it comprises, and describes the functionalities provided by the different system components to support SOC operators in performing incident management tasks.
References
More filters
Journal ArticleDOI
Stuxnet: Dissecting a Cyberwarfare Weapon
TL;DR: Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet, which followed a completely new approach that's no longer aligned with confidentiality, integrity, and availability thinking.
Proceedings ArticleDOI
Big Data analytics
TL;DR: This analysis illustrates that the Big Data analytics is a fast-growing, influential practice and a key enabler for the social business and is critical for success in the age of social media.
Proceedings ArticleDOI
Information sharing across private databases
TL;DR: This work formalizes the notion of minimal information sharing across private databases, and develops protocols for intersection, equijoin, intersection size, and Equijoin size.
Journal ArticleDOI
Nurturing interpersonal trust in knowledge-sharing networks
TL;DR: This work conducted interviews in 20 organizations to identify ways in which interpersonal trust in a knowledge-sharing context develops and summarize behaviors and practices for managers interested in promoting trust (and thereby knowledge creation and sharing) within their own organizations.
Book
Virtual teams that work : creating conditions for virtual team effectiveness
TL;DR: In this article, the authors established a foundation for shared understanding, integration, and trust in virtual teams, and proposed a framework for virtual teams to share knowledge and knowledge sharing among themselves.
Related Papers (5)
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Wiem Tounsi,Helmi Rais +1 more