Journal ArticleDOI
A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing
Reads0
Chats0
TLDR
A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.Citations
More filters
Journal ArticleDOI
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Wiem Tounsi,Helmi Rais +1 more
TL;DR: It is shown in this paper why having a standardized representation of threat information can improve the quality of TTI, thus providing better automated analytics solutions on large volumes of T TI which are often non-uniform and redundant.
Proceedings ArticleDOI
MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform
TL;DR: The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks, and to Enable detection via collaborative-knowledge-sharing about existing malware and other threats.
Journal ArticleDOI
Cyber threat intelligence sharing: Survey and research directions
TL;DR: This extensive literature survey explores the current state-of-the-art and approaches different problem areas of interest pertaining to the larger field of sharing cyber threat intelligence.
Journal ArticleDOI
Cyber security in smart cities: A review of deep learning-based applications and case studies
TL;DR: This paper summarizes the knowledge and interpretation of Smart Cities (SC), Cyber Security (CS), and Deep Learning (DL) concepts as well as discussed existing related work on IoT security in smart cities.
Journal ArticleDOI
Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review
Priyanka Dixit,Sanjay Silakari +1 more
TL;DR: From the experimental analysis, it is clear that the deep learning model improved the accuracy, scalability, reliability, and performance of the cybersecurity applications when applied in realtime.
References
More filters
Proceedings ArticleDOI
Trustworthy incident information sharing in social cyber defense alliances
Florian Skopik,Qin Li +1 more
TL;DR: An incentive model, which encourages information security stakeholders to share incident information is discussed, and an architectural blueprint is highlighted which is able to support the establishment of the proposed social cyber defense alliances in a real world context, and its applicability is evaluated using agent-based simulations.
Tallin Manual on the International Law Applicable to Cyber Warfare
TL;DR: The Tallinn Manual as mentioned in this paper identifies the international law applicable to cyber warfare and sets out ninety-five "black-letter rules" governing such conflicts, including the jus ad bellum, international humanitarian law, and the law of neutrality.
Proceedings ArticleDOI
A blueprint for a pan-European cyber incident analysis system
Giuseppe Settanni,Florian Skopik,Yegor Shovgenya,Roman Fiedler,Helmut Kaufmann,Tobias Gebhardt,Christophe Ponchel,Klaus Theuerkauf,Konstantin Boettinger,Mark Carolan,Damien Conroy,Gavin Davey,Pia Olli,Heimo Pentikaeinen +13 more
TL;DR: A collaborative approach to cyber incident information analysis for gaining situational awareness in a European control system security network is introduced.
Related Papers (5)
A survey on technical threat intelligence in the age of sophisticated cyber attacks
Wiem Tounsi,Helmi Rais +1 more