[HTML][HTML] Current approaches and future directions for cyber threat intelligence sharing: A survey

P Alaeifar, S Pal, Z Jadidi, M Hussain, E Foo - Journal of Information …, 2024 - Elsevier
Abstract Cyber Threat Intelligence (CTI) is essential knowledge concerning cyber and
physical threats aimed at mitigating potential cyber attacks. The rapid evolution of …

[HTML][HTML] The cybersecurity mesh: A comprehensive survey of involved artificial intelligence methods, cryptographic protocols and challenges for future research

B Ramos-Cruz, J Andreu-Perez, L Martínez - Neurocomputing, 2024 - Elsevier
In today's world, it is vital to have strong cybersecurity measures in place. To combat the
ever-evolving threats, adopting advanced models like cybersecurity mesh is necessary to …

Ethertwin: Blockchain-based secure digital twin information management

B Putz, M Dietz, P Empl, G Pernul - Information processing & management, 2021 - Elsevier
Digital Twins are complex digital representations of assets that are used by a variety of
organizations across the Industry 4.0 value chain. As the digitization of industrial processes …

Towards secure and practical consensus for blockchain based VANET

S Kudva, S Badsha, S Sengupta, I Khalil, A Zomaya - Information Sciences, 2021 - Elsevier
The massive adoption of the blockchain-based distributed framework has made it possible
to store and transmit Vehicular Ad Hoc Network (VANET) application data transparently …

Cyber threat intelligence on blockchain: A systematic literature review

D Chatziamanetoglou, K Rantos - Computers, 2024 - mdpi.com
Cyber Threat Intelligence (CTI) has become increasingly important in safeguarding
organizations against cyber threats. However, managing, storing, analyzing, and sharing …

[HTML][HTML] Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof

Z Ren, E Yan, T Chen, Y Yu - Journal of King Saud University-Computer …, 2024 - Elsevier
Nowadays, the integration of blockchain technology with Ciphertext-Policy Attribute-Based
Encryption (CP-ABE) has drawn the researcher attention because it can provide key security …

[HTML][HTML] A systematic review of blockchain for consent management

PV Kakarlapudi, QH Mahmoud - Healthcare, 2021 - mdpi.com
Blockchain technology was introduced through Bitcoin in a 2008 whitepaper by the
mysterious Satoshi Nakamoto. Since its inception, it has gathered great attention because of …

FairShare: Blockchain Enabled Fair, Accountable and Secure Data Sharing for Industrial IoT

J Sengupta, S Ruj, SD Bit - IEEE Transactions on Network and …, 2023 - ieeexplore.ieee.org
Industrial Internet of Things (IIoT) opens up a challenging research area towards improving
secure data sharing which currently has several limitations. Primarily, the lack of inbuilt …

Distributed security framework for reliable threat intelligence sharing

D Preuveneers, W Joosen… - Security and …, 2020 - Wiley Online Library
Computer security incident response teams typically rely on threat intelligence platforms for
information about sightings of cyber threat events and indicators of compromise. Other …

Blockchain for cybersecurity: systematic literature review and classification

M Liu, W Yeoh, F Jiang, KKR Choo - Journal of Computer …, 2022 - Taylor & Francis
Blockchain has transitioned beyond the hype to reality, as evidenced by the amount of
research it has attracted and by its commercial applications. One popular application of …