scispace - formally typeset
Journal ArticleDOI

A Problem Shared is a Problem Halved: A Survey on the Dimensions of Collective Cyber Defense Through Security Information Sharing

Reads0
Chats0
TLDR
A structured overview about the dimensions of cyber security information sharing is provided, motivated in more detail and work out the requirements for an information sharing system, and a critical review of the state of the art is reviewed.
About
This article is published in Computers & Security.The article was published on 2016-07-01. It has received 166 citations till now. The article focuses on the topics: Information sharing & The Internet.

read more

Citations
More filters
Journal ArticleDOI

A survey on technical threat intelligence in the age of sophisticated cyber attacks

Wiem Tounsi, +1 more
- 01 Jan 2018 - 
TL;DR: It is shown in this paper why having a standardized representation of threat information can improve the quality of TTI, thus providing better automated analytics solutions on large volumes of T TI which are often non-uniform and redundant.
Proceedings ArticleDOI

MISP: The Design and Implementation of a Collaborative Threat Intelligence Sharing Platform

TL;DR: The aim of MISP is to help in setting up preventive actions and counter-measures used against targeted attacks, and to Enable detection via collaborative-knowledge-sharing about existing malware and other threats.
Journal ArticleDOI

Cyber threat intelligence sharing: Survey and research directions

TL;DR: This extensive literature survey explores the current state-of-the-art and approaches different problem areas of interest pertaining to the larger field of sharing cyber threat intelligence.
Journal ArticleDOI

Cyber security in smart cities: A review of deep learning-based applications and case studies

TL;DR: This paper summarizes the knowledge and interpretation of Smart Cities (SC), Cyber Security (CS), and Deep Learning (DL) concepts as well as discussed existing related work on IoT security in smart cities.
Journal ArticleDOI

Deep Learning Algorithms for Cybersecurity Applications: A Technological and Status Review

TL;DR: From the experimental analysis, it is clear that the deep learning model improved the accuracy, scalability, reliability, and performance of the cybersecurity applications when applied in realtime.
References
More filters
Proceedings ArticleDOI

Trustworthy incident information sharing in social cyber defense alliances

TL;DR: An incentive model, which encourages information security stakeholders to share incident information is discussed, and an architectural blueprint is highlighted which is able to support the establishment of the proposed social cyber defense alliances in a real world context, and its applicability is evaluated using agent-based simulations.

Tallin Manual on the International Law Applicable to Cyber Warfare

TL;DR: The Tallinn Manual as mentioned in this paper identifies the international law applicable to cyber warfare and sets out ninety-five "black-letter rules" governing such conflicts, including the jus ad bellum, international humanitarian law, and the law of neutrality.
Related Papers (5)