scispace - formally typeset
Journal ArticleDOI

A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing

TLDR
A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.
About
This article is published in Computers & Security.The article was published on 2016-07-01. It has received 166 citations till now. The article focuses on the topics: Information sharing & The Internet.

read more

Citations
More filters
Book ChapterDOI

Digital Twins for Precision Healthcare

TL;DR: The role of DT to achieve precision healthcare, proposed frameworks, the value of active participation and continuous monitoring, and the cyber-security challenges and ethical implications for this emerging paradigm are discussed.
Journal ArticleDOI

PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing

TL;DR: PRACIS is introduced, a scheme for CIS networks that guarantees private data forwarding and aggregation and can be seamlessly integrated with existing STIX-based message brokering middleware such as publish-subscribe architectures, by combining standard format-preserving and homomorphic encryption primitives.
Journal ArticleDOI

Cybercrime threat intelligence: A systematic multi-vocal literature review

TL;DR: A systematic literature review shows the dimensions of risk assessment techniques today available for the surface, deep, and darknets areas and what website features should be used in order to identify a cyber threat or attack.
Journal ArticleDOI

A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished

TL;DR: The CTI capability model (CTI-CM) is proposed to prescribe the key capabilities necessary for a CTI practitioner to engage effectively in CTI activities and explains how these capabilities can be fostered, and the key implications for leading security practice in organizations.
Journal ArticleDOI

A collaborative cyber incident management system for European interconnected critical infrastructures

TL;DR: This paper proposes a system architecture for a National SOC, defining the functional components and interfaces it comprises, and describes the functionalities provided by the different system components to support SOC operators in performing incident management tasks.
References
More filters
Journal ArticleDOI

Stuxnet: Dissecting a Cyberwarfare Weapon

R Langner
TL;DR: Last year marked a turning point in the history of cybersecurity-the arrival of the first cyber warfare weapon ever, known as Stuxnet, which followed a completely new approach that's no longer aligned with confidentiality, integrity, and availability thinking.
Proceedings ArticleDOI

Big Data analytics

TL;DR: This analysis illustrates that the Big Data analytics is a fast-growing, influential practice and a key enabler for the social business and is critical for success in the age of social media.
Proceedings ArticleDOI

Information sharing across private databases

TL;DR: This work formalizes the notion of minimal information sharing across private databases, and develops protocols for intersection, equijoin, intersection size, and Equijoin size.
Journal ArticleDOI

Nurturing interpersonal trust in knowledge-sharing networks

TL;DR: This work conducted interviews in 20 organizations to identify ways in which interpersonal trust in a knowledge-sharing context develops and summarize behaviors and practices for managers interested in promoting trust (and thereby knowledge creation and sharing) within their own organizations.
Book

Virtual teams that work : creating conditions for virtual team effectiveness

TL;DR: In this article, the authors established a foundation for shared understanding, integration, and trust in virtual teams, and proposed a framework for virtual teams to share knowledge and knowledge sharing among themselves.
Related Papers (5)