Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …
A comparative study on cyber threat intelligence: The security incident response perspective
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …
However, use for incident response demands standardization. This study examines the …
[HTML][HTML] A reference model for cyber threat intelligence (CTI) systems
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with
many organizations investing in the development of proper tools and services and the …
many organizations investing in the development of proper tools and services and the …
[HTML][HTML] A methodology to evaluate standards and platforms within cyber threat intelligence
A de Melo e Silva, JJ Costa Gondim… - Future Internet, 2020 - mdpi.com
The cyber security landscape is fundamentally changing over the past years. While
technology is evolving and new sophisticated applications are being developed, a new …
technology is evolving and new sophisticated applications are being developed, a new …
CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …
information security is essentially defined by the maturity of security operations and incident …
A success model for cyber threat intelligence management platforms
The increasingly persistent and sophisticated threat actors, along with the sheer speed at
which cyber attacks unfold, have made timely decision making imperative for ensuring the …
which cyber attacks unfold, have made timely decision making imperative for ensuring the …
From threat data to actionable intelligence: an exploratory analysis of the intelligence cycle implementation in cyber threat intelligence sharing platforms
In the last couple of years, organizations have demonstrated an increasing willingness to
share data, information and intelligence regarding emerging threats to collectively protect …
share data, information and intelligence regarding emerging threats to collectively protect …
Threat intelligence quality dimensions for research and practice
As the adoption and diversity of threat intelligence solutions continue to grow, questions
about their effectiveness, particularly in regards to the quality of the data they provide …
about their effectiveness, particularly in regards to the quality of the data they provide …
What's in a Cyber Threat Intelligence sharing platform? A mixed-methods user experience investigation of MISP
The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities
necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse …
necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse …
DEALER: decentralized incentives for threat intelligence reporting and exchange
The exchange of threat intelligence information can make a significant contribution to
improving IT security in companies and has become increasingly important in recent years …
improving IT security in companies and has become increasingly important in recent years …