A systematic literature review on cyber threat intelligence for organizational cybersecurity resilience

S Saeed, SA Suayyid, MS Al-Ghamdi, H Al-Muhaisen… - Sensors, 2023 - mdpi.com
Cybersecurity is a significant concern for businesses worldwide, as cybercriminals target
business data and system resources. Cyber threat intelligence (CTI) enhances …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence

T Jiang, G Shen, C Guo, Y Cui, B **e - Computer Networks, 2023 - Elsevier
Abstract Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …

Explainable intelligence-driven defense mechanism against advanced persistent threats: A joint edge game and AI approach

H Li, J Wu, H Xu, G Li, M Guizani - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Advanced persistent threats (APT) have novel features such as long-term latency, precision
strikes and uncertain strategies. APT poses severe threats to the resource-limited edge …

TIIA: A blockchain-enabled threat intelligence integrity audit scheme for IIoT

W Zhang, Y Bai, J Feng - Future Generation Computer Systems, 2022 - Elsevier
With the widespread deployment of the Industrial Internet of Things technology (IIoT), the
cyber security threats of IIoT systems are increasing. Threat intelligence sharing is an …

A survey of security threats and defense on Blockchain

J Cheng, L **e, X Tang, N **ong, B Liu - Multimedia Tools and …, 2021 - Springer
Blockchain provides a trusted environment for storing information and propagating
transactions. Owing to the distributed property and integrity, blockchain has been employed …

An anomaly detection on blockchain infrastructure using artificial intelligence techniques: Challenges and future directions–A review

V Chithanuru, M Ramaiah - Concurrency and Computation …, 2023 - Wiley Online Library
Recently, Blockchain cryptographic distributed transaction ledger technology finds its usage
in many applications. The application's ledgers implemented through Blockchain, ensures …

DEALER: decentralized incentives for threat intelligence reporting and exchange

F Menges, B Putz, G Pernul - International Journal of Information Security, 2021 - Springer
The exchange of threat intelligence information can make a significant contribution to
improving IT security in companies and has become increasingly important in recent years …

[PDF][PDF] Data elimination on repetition using a blockchain based cyber threat intelligence

S Smys, W Haoxiang - IRO Journal on Sustainable Wireless …, 2021 - scholar.archive.org
Cyber threat is a major issue that has been terrorizing the computing work. A typical cyber-
physical system is crucial in ensuring a safe and secure architecture of a sustainable …

Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus

D Chatziamanetoglou, K Rantos - Security and Communication …, 2023 - Wiley Online Library
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is
collected, processed, analysed, and disseminated to the right audience, in order to …