[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

[HTML][HTML] Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems

HT Bui, H Aboutorab, A Mahboubi, Y Gao… - Computers & …, 2024 - Elsevier
The digitisation of agriculture, integral to Agriculture 4.0, has brought significant benefits
while simultaneously escalating cybersecurity risks. With the rapid adoption of smart farming …

[HTML][HTML] Current approaches and future directions for cyber threat intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

Robust botnet DGA detection: Blending XAI and OSINT for cyber threat intelligence sharing

H Suryotrisongko, Y Musashi, A Tsuneda… - IEEE …, 2022 - ieeexplore.ieee.org
We investigated 12 years DNS query logs of our campus network and identified phenomena
of malicious botnet domain generation algorithm (DGA) traffic. DGA-based botnets are …

[HTML][HTML] Cyber threat attribution using unstructured reports in cyber threat intelligence

E Irshad, AB Siddiqui - Egyptian Informatics Journal, 2023 - Elsevier
Cyber-threat attribution is the identification of attacker responsible for a cyber-attack. It is a
challenging task as attacker uses different obfuscation and deception techniques to hide its …

[HTML][HTML] Sharing machine learning models as indicators of compromise for cyber threat intelligence

D Preuveneers, W Joosen - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Cyber threat intelligence (CTI) sharing is the collaborative effort of sharing information about
cyber attacks to help organizations gain a better understanding of threats and proactively …

A quantitative evaluation of trust in the quality of cyber threat intelligence sources

T Schaberreiter, V Kupfersberger, K Rantos… - Proceedings of the 14th …, 2019 - dl.acm.org
Threat intelligence sharing has become a cornerstone of cooperative and collaborative
cybersecurity. Sources providing such data have become more widespread in recent years …

Distributed security framework for reliable threat intelligence sharing

D Preuveneers, W Joosen… - Security and …, 2020 - Wiley Online Library
Computer security incident response teams typically rely on threat intelligence platforms for
information about sightings of cyber threat events and indicators of compromise. Other …

Blocis: blockchain-based cyber threat intelligence sharing framework for sybil-resistance

S Gong, C Lee - Electronics, 2020 - mdpi.com
The convergence of fifth-generation (5G) communication and the Internet-of-Things (IoT) has
dramatically increased the diversity and complexity of the network. This change diversifies …