scispace - formally typeset
Journal ArticleDOI

A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing

Reads0
Chats0
TLDR
A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.
About
This article is published in Computers & Security.The article was published on 2016-07-01. It has received 166 citations till now. The article focuses on the topics: Information sharing & The Internet.

read more

Citations
More filters
Journal ArticleDOI

A survey on technical threat intelligence in the age of sophisticated cyber attacks

Wiem Tounsi, +1 more
- 01 Jan 2018 - 
TL;DR: It is shown in this paper why having a standardized representation of threat information can improve the quality of TTI, thus providing better automated analytics solutions on large volumes of T TI which are often non-uniform and redundant.
Proceedings ArticleDOI

MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform

TL;DR: The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks, and to Enable detection via collaborative-knowledge-sharing about existing malware and other threats.
Journal ArticleDOI

Cyber threat intelligence sharing: Survey and research directions

TL;DR: This extensive literature survey explores the current state-of-the-art and approaches different problem areas of interest pertaining to the larger field of sharing cyber threat intelligence.
Journal ArticleDOI

Cyber security in smart cities: A review of deep learning-based applications and case studies

TL;DR: This paper summarizes the knowledge and interpretation of Smart Cities (SC), Cyber Security (CS), and Deep Learning (DL) concepts as well as discussed existing related work on IoT security in smart cities.
Journal ArticleDOI

Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review

TL;DR: From the experimental analysis, it is clear that the deep learning model improved the accuracy, scalability, reliability, and performance of the cybersecurity applications when applied in realtime.
References
More filters
ReportDOI

A common language for computer security incidents

TL;DR: The authors developed a minimum set of high-level terms, along with a structure indicating their relationship (a taxonomy), which can be used to classify and understand computer security incident information.
Journal ArticleDOI

The Economic Incentives for Sharing Security Information

TL;DR: In this article, the authors developed an analytical framework to investigate the competitive implications of sharing security information and investments in security technologies and found that security technology investments and security information sharing act as "strategic complements" in equilibrium.
Posted Content

Sharing Information on Computer Systems Security: An Economic Analysis

TL;DR: A model to examine the welfare economic implications of the movement toward sharing information concerning computer security, with particular emphasis on protecting critical infrastructure assets that are largely owned by the private sector is presented.
Journal ArticleDOI

Sharing information on computer systems security: An economic analysis

TL;DR: In this article, the authors examined the welfare economic implications of sharing information concerning computer security, with particular emphasis on protecting critical infrastructure assets that are largely owned by the private sector, and provided necessary and sufficient conditions for information sharing to lead to an increased (decreased) level of information security.
Related Papers (5)