2017
DOI: 10.1016/j.cose.2017.02.005
|View full text |Cite
|
Sign up to set email alerts
|

Data-driven analytics for cyber-threat intelligence and information sharing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
49
0
1

Year Published

2017
2017
2020
2020

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 105 publications
(50 citation statements)
references
References 3 publications
0
49
0
1
Order By: Relevance
“…An extension to STIX that supports sharing the information about the impact of cyberevents outside an organization was proposed by Fransen et al who discuss it in the context of operation of the Dutch National Detection Network. Qamar et al integrated concepts of STIX and CybOX together with the Common Vulnerabilities and Exposures (CVE) notation and a network model into a Web Ontology Language–based ontology that enables threat‐related specifications, semantic reasoning, and contextual analyses. de Fuentes et al enhanced STIX with privacy‐preserving mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…An extension to STIX that supports sharing the information about the impact of cyberevents outside an organization was proposed by Fransen et al who discuss it in the context of operation of the Dutch National Detection Network. Qamar et al integrated concepts of STIX and CybOX together with the Common Vulnerabilities and Exposures (CVE) notation and a network model into a Web Ontology Language–based ontology that enables threat‐related specifications, semantic reasoning, and contextual analyses. de Fuentes et al enhanced STIX with privacy‐preserving mechanisms.…”
Section: Related Workmentioning
confidence: 99%
“…CTI on vasta kehittymäisillään (Ernst & Young, 2014) ja monista yrityksistä huolimatta akateemisessa yhteisössä ei ole selkeää selitystä (Abu ym., 2018;Qamar, Anwar, Rahman, Al-Shaer & Chu, 2017), mitä CTI tarkoittaa.…”
Section: Käsiteunclassified
“…Several studies related to social engineering are more widely discussed from the computational and system security aspects. The researcher argues that social engineering has a strong interdisciplinary relationship various studies in social psychology and cognitive psychology [3], [10], [11]. Some psychological states that can be exploited including strong emotion, overloading, reciprocity, moral responsibility, integrity and consistency, power, and deceptive relationships [12].…”
Section: Introductionmentioning
confidence: 99%