BFLS: Blockchain and Federated Learning for sharing threat detection models as Cyber Threat Intelligence
T Jiang, G Shen, C Guo, Y Cui, B **e - Computer Networks, 2023 - Elsevier
Abstract Recently, Cyber Threat Intelligence (CTI) sharing has become an important weapon
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …
for cyber defenders to mitigate the increasing number of cyber attacks in a proactive and …
Cyber Threat Intelligence on Blockchain: A Systematic Literature Review
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
organizations against cyber threats. However, managing, storing, analyzing, and sharing …
Decentralized actionable cyber threat intelligence for networks and the internet of things
Security presents itself as one of the biggest threats to the enabling and the deployment of
the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity …
the Internet of Things (IoT). Security challenges are evident in light of recent cybersecurity …
A blockchain-enabled incentivised framework for cyber threat intelligence sharing in ics
Industrial Control Systems (ICS) have been targeted increasingly by sophisticated
cyberattacks. Improving ICS security has drawn significant attention in the literature that …
cyberattacks. Improving ICS security has drawn significant attention in the literature that …
Blockchain-based multi-organizational cyber risk management framework for collaborative environments
Along with the increasing damage of cyberattacks, cyber risk management remains one of
the most crucial proactive measures. Risk management aims to identify potential risks …
the most crucial proactive measures. Risk management aims to identify potential risks …
[HTML][HTML] SPM-SeCTIS: Severity Pattern Matching for Secure Computable Threat Information Sharing in Intelligent Additive Manufacturing
Abstract Sharing Cyber Threat Intelligence (CTI) enables organisations to work together to
defend against cyberattacks. However, current methods often fail to adequately protect …
defend against cyberattacks. However, current methods often fail to adequately protect …
Secure and Efficient Exchange of Threat Information Using Blockchain Technology
M Pahlevan, V Ionita - Information, 2022 - mdpi.com
In recent years, sharing threat information has been one of the most suggested solutions for
combating the ever-increasing number of cyberattacks, which stem from the system-wide …
combating the ever-increasing number of cyberattacks, which stem from the system-wide …
Blockchain-based security framework for the internet of things and home networks
DMM Mena - 2021 - search.proquest.com
During recent years, attacks on Internet of Things (IoT) devices have grown significantly.
Cyber criminals have been using compromised IoT machines to attack others, which include …
Cyber criminals have been using compromised IoT machines to attack others, which include …
Machine learning-based fraud detection in blockchain: a qualitative survey in IT, business, and finance sectors
A Blockchain is a secure, decentralized ledger that underpins cryptocurrencies such as
Bitcoin and future distributed computing infrastructures based on consensus truth assertions …
Bitcoin and future distributed computing infrastructures based on consensus truth assertions …
RTB-RM: A Blockchainenabled System for Reliable and Transparent CTI Sharing with Multidimensional Reputation Model
The continuous evolution of network threats has made Cyber Threat Intelligence (CTI)
sharing an essential strategy to counter these challenges. However, existing CTI data …
sharing an essential strategy to counter these challenges. However, existing CTI data …