A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience
S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …
business data and system resources. Cyber threat intelligence (CTI) enhances …
Survey on Unified Threat Management (UTM) Systems for Home Networks
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …
professional network administration support, while sophisticated attacks pose enormous …
BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence
T Jiang, G Shen, C Guo, Y Cui, B **e - Computer Networks, 2023 - Elsevier
Abstract Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …
Explainable intelligence-driven defense mechanism against advanced persistent threats: A joint edge game and AI approach
Advanced persistent threats (APT) have novel features such as long-term latency, precision
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …
TIIA: A blockchain-enabled threat intelligence integrity audit scheme for IIoT
W Zhang, Y Bai, J Feng - Future Generation Computer Systems, 2022 - Elsevier
With the widespread deployment of the Industrial Internet of Things technology (IIoT), the
cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an …
cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an …
A survey of security threats and defense on Blockchain
Blockchain provides a trusted environment for storing information and propagating
transactions. Owing to the distributed property and integrity, blockchain has been employed …
transactions. Owing to the distributed property and integrity, blockchain has been employed …
An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review
Recently, Blockchain cryptographic distributed transaction ledger technology finds its usage
in many applications. The application's ledgers implemented through Blockchain, ensures …
in many applications. The application's ledgers implemented through Blockchain, ensures …
DEALER: decentralized incentives for threat intelligence reporting and exchange
The exchange of threat intelligence information can make a significant contribution to
improving IT security in companies and has become increasingly important in recent years …
improving IT security in companies and has become increasingly important in recent years …
[PDF][PDF] Data elimination on repetition using a blockchain based cyber threat intelligence
S Smys, W Haoxiang - IRO Journal on Sustainable Wireless …, 2021 - scholar.archive.org
Cyber threat is a major issue that has been terrorizing the computing work. A typical cyber-
physical system is crucial in ensuring a safe and secure architecture of a sustainable …
physical system is crucial in ensuring a safe and secure architecture of a sustainable …
Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is
collected, processed, analysed, and disseminated to the right audience, in order to …
collected, processed, analysed, and disseminated to the right audience, in order to …