Cyber threat intelligence mining for proactive cybersecurity defense: A survey and new perspectives

N Sun, M Ding, J Jiang, W Xu, X Mo… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Today's cyber attacks have become more severe and frequent, which calls for a new line of
security defenses to protect against them. The dynamic nature of new-generation threats …

[HTML][HTML] Dynamic risk assessment in cybersecurity: A systematic literature review

P Cheimonidis, K Rantos - Future Internet, 2023 - mdpi.com
Traditional information security risk assessment (RA) methodologies and standards,
adopted by information security management systems and frameworks as a foundation …

Understanding indicators of compromise against cyber-attacks in industrial control systems: a security perspective

M Asiri, N Saxena, R Gjomemo, P Burnap - ACM transactions on cyber …, 2023 - dl.acm.org
Numerous sophisticated and nation-state attacks on Industrial Control Systems (ICSs) have
increased in recent years, exemplified by Stuxnet and Ukrainian Power Grid. Measures to be …

A different cup of {TI}? the added value of commercial threat intelligence

X Bouwman, H Griffioen, J Egbers, C Doerr… - 29th USENIX security …, 2020 - usenix.org
Commercial threat intelligence is thought to provide unmatched coverage on attacker
behavior, but it is out of reach for many organizations due to its hefty price tag. This paper …

Cyber threat intelligence: A product without a process?

K Oosthoek, C Doerr - International Journal of Intelligence and …, 2021 - Taylor & Francis
Cyber threats have become a permanent threat to society. Over the last few years, accounts
of hacking campaigns into public-and private-sector enterprises have drawn significant …

Interoperability challenges in the cybersecurity information sharing ecosystem

K Rantos, A Spyros, A Papanikolaou, A Kritsas… - Computers, 2020 - mdpi.com
Threat intelligence helps businesses and organisations make the right decisions in their
fight against cyber threats, and strategically design their digital defences for an optimised …

[HTML][HTML] Blockchain-based cyber threat intelligence system architecture for sustainable computing

J Cha, SK Singh, Y Pan, JH Park - Sustainability, 2020 - mdpi.com
Nowadays, the designing of cyber-physical systems has a significant role and plays a
substantial part in develo** a sustainable computing ecosystem for secure and scalable …

CTI-SOC2M2–The quest for mature, intelligence-driven security operations and incident response capabilities

D Schlette, M Vielberth, G Pernul - Computers & Security, 2021 - Elsevier
Threats, cyber attacks, and security incidents pertain to organizations of all types. Everyday
information security is essentially defined by the maturity of security operations and incident …

Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus

D Chatziamanetoglou, K Rantos - Security and Communication …, 2023 - Wiley Online Library
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is
collected, processed, analysed, and disseminated to the right audience, in order to …

OVANA: An approach to analyze and improve the information quality of vulnerability databases

P Kuehn, M Bayer, M Wendelborn… - Proceedings of the 16th …, 2021 - dl.acm.org
Vulnerability databases are one of the main information sources for IT security experts.
Hence, the quality of their information is of utmost importance for anyone working in this …