[HTML][HTML] Cyber-threat intelligence for security decision-making: A review and research agenda for practice

S Ainslie, D Thompson, S Maynard, A Ahmad - Computers & Security, 2023 - Elsevier
The increasing militarization of the cyber-threat environment has driven considerable
interest in understanding the role of cyber-threat intelligence (CTI) in supporting the …

A comparative study on cyber threat intelligence: The security incident response perspective

D Schlette, M Caselli, G Pernul - … Communications Surveys & …, 2021 - ieeexplore.ieee.org
Cyber Threat Intelligence (CTI) is threat information intended for security purposes.
However, use for incident response demands standardization. This study examines the …

[HTML][HTML] A reference model for cyber threat intelligence (CTI) systems

G Sakellariou, P Fouliras, I Mavridis, P Sarigiannidis - Electronics, 2022 - mdpi.com
Cyber Threat Intelligence (CTI) is a new but promising field of information security, with
many organizations investing in the development of proper tools and services and the …

[HTML][HTML] A methodology to evaluate standards and platforms within cyber threat intelligence

A de Melo e Silva, JJ Costa Gondim… - Future Internet, 2020 - mdpi.com
The cyber security landscape is fundamentally changing over the past years. While
technology is evolving and new sophisticated applications are being developed, a new …

CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities

D Schlette, M Vielberth, G Pernul - Computers & Security, 2021 - Elsevier
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …

A success model for cyber threat intelligence management platforms

A Zibak, C Sauerwein, A Simpson - Computers & Security, 2021 - Elsevier
The increasingly persistent and sophisticated threat actors, along with the sheer speed at
which cyber attacks unfold, have made timely decision making imperative for ensuring the …

From threat data to actionable intelligence: an exploratory analysis of the intelligence cycle implementation in cyber threat intelligence sharing platforms

C Sauerwein, D Fischer, M Rubsamen… - Proceedings of the 16th …, 2021 - dl.acm.org
In the last couple of years, organizations have demonstrated an increasing willingness to
share data, information and intelligence regarding emerging threats to collectively protect …

Threat intelligence quality dimensions for research and practice

A Zibak, C Sauerwein, AC Simpson - Digital Threats: Research and …, 2022 - dl.acm.org
As the adoption and diversity of threat intelligence solutions continue to grow, questions
about their effectiveness, particularly in regards to the quality of the data they provide …

What's in a Cyber Threat Intelligence sharing platform? A mixed-methods user experience investigation of MISP

B Stojkovski, G Lenzini, V Koenig, S Rivas - Proceedings of the 37th …, 2021 - dl.acm.org
The ever-increasing scale and complexity of cyber attacks and cyber-criminal activities
necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse …

DEALER: decentralized incentives for threat intelligence reporting and exchange

F Menges, B Putz, G Pernul - International Journal of Information Security, 2021 - Springer
The exchange of threat intelligence information can make a significant contribution to
improving IT security in companies and has become increasingly important in recent years …