Journal ArticleDOI
A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing
Reads0
Chats0
TLDR
A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.Citations
More filters
Journal ArticleDOI
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Wiem Tounsi,Helmi Rais +1 more
TL;DR: It is shown in this paper why having a standardized representation of threat information can improve the quality of TTI, thus providing better automated analytics solutions on large volumes of T TI which are often non-uniform and redundant.
Proceedings ArticleDOI
MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform
TL;DR: The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks, and to Enable detection via collaborative-knowledge-sharing about existing malware and other threats.
Journal ArticleDOI
Cyber threat intelligence sharing: Survey and research directions
TL;DR: This extensive literature survey explores the current state-of-the-art and approaches different problem areas of interest pertaining to the larger field of sharing cyber threat intelligence.
Journal ArticleDOI
Cyber security in smart cities: A review of deep learning-based applications and case studies
TL;DR: This paper summarizes the knowledge and interpretation of Smart Cities (SC), Cyber Security (CS), and Deep Learning (DL) concepts as well as discussed existing related work on IoT security in smart cities.
Journal ArticleDOI
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Priyanka Dixit,Sanjay Silakari +1 more
TL;DR: From the experimental analysis, it is clear that the deep learning model improved the accuracy, scalability, reliability, and performance of the cybersecurity applications when applied in realtime.
References
More filters
ReportDOI
A common language for computer security incidents
TL;DR: The authors developed a minimum set of high-level terms, along with a structure indicating their relationship (a taxonomy), which can be used to classify and understand computer security incident information.
Journal ArticleDOI
The Economic Incentives for Sharing Security Information
Esther Gal-Or,Anindya Ghose +1 more
TL;DR: In this article, the authors developed an analytical framework to investigate the competitive implications of sharing security information and investments in security technologies and found that security technology investments and security information sharing act as "strategic complements" in equilibrium.
Posted Content
Sharing Information on Computer Systems Security: An Economic Analysis
TL;DR: A model to examine the welfare economic implications of the movement toward sharing information concerning computer security, with particular emphasis on protecting critical infrastructure assets that are largely owned by the private sector is presented.
Journal ArticleDOI
Sharing information on computer systems security: An economic analysis
TL;DR: In this article, the authors examined the welfare economic implications of sharing information concerning computer security, with particular emphasis on protecting critical infrastructure assets that are largely owned by the private sector, and provided necessary and sufficient conditions for information sharing to lead to an increased (decreased) level of information security.
Related Papers (5)
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Wiem Tounsi,Helmi Rais +1 more