Secure aggregation of sufficiently many private inputs [PDF]
Secure aggregation of distributed inputs is a well-studied problem. In this study, anonymity of inputs is achieved by assuring a minimal quota before publishing the outcome.
Thijs Veugen +3 more
doaj +2 more sources
EDAER: Entropy-Driven Approach for Entity and Relation Extraction in Chinese Cyber Threat Intelligence [PDF]
Cyber threat intelligence (CTI) has been explored to strengthen system security via taking raw threat data from various data sources and transforming it into actionable insights that enable organizations to predict, detect, and respond to cyber threats ...
Yong Li +6 more
doaj +2 more sources
BlockIntelChain: a blockchain-based cyber threat intelligence sharing architecture [PDF]
The exponential growth of sophisticated cyber threats in Internet of Things (IoT) environments has exposed fundamental weaknesses in existing Cyber Threat Intelligence (CTI) platforms, including centralized architectures, trust deficits, privacy ...
Alaa Tolah
doaj +2 more sources
A Systematic Literature Review on Cyber Threat Intelligence for Organizational Cybersecurity Resilience [PDF]
Saeed,S +2 more
exaly +2 more sources
Cyber Threat Intelligence for Improving Cybersecurity and Risk Management in Critical Infrastructure [PDF]
Cyber-attack is one of the significant threats affecting to any organisation specifically to the Critical Infrastructure (CI) organisation. These attacks are nowadays more sophisticated, multi-vectored and less predictable, which make the Cyber Security ...
Halima Kure, Shareeful Islam
doaj +3 more sources
Measuring and visualizing cyber threat intelligence quality [PDF]
The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of ...
Böhm, Fabian +3 more
core +1 more source
Computer crime motives: Do we have it right?
Abstract Academic, legal and practitioner responses to cyber threats have been predominantly reactive, punitive, and deterrence‐based, with limited attention given to the motives underlying computer criminals' behaviors. This paper reasons that new and better theoretical perspectives are needed to explain computer criminals' motives. Following a review
Derrick Neufeld
wiley +1 more source
Blockchain‐Based Cyber Threat Intelligence Sharing Using Proof‐of‐Quality Consensus
Cyber threat intelligence (CTI) is contextualised knowledge, built on information that is collected, processed, analysed, and disseminated to the right audience, in order to comprehend a malicious threat actor’s motivation, goals, objectives, targets, and attack behaviours.
Dimitrios Chatziamanetoglou +2 more
wiley +1 more source
SecTKG: A Knowledge Graph for Open‐Source Security Tools
As the complexity of cyberattacks continues to increase, multistage combination attacks have become the primary method of attack. Attackers plan and organize a series of attack steps, using various attack tools to achieve specific goals. Extracting knowledge about these tools is of great significance for both defense and tracing of attacks.
Siqi Sun +4 more
wiley +1 more source
Intelligent protection coordination restoration strategy for active distribution networks
Abstract Despite various advantages of integrating distributed generation (DG) units into distribution networks such as power loss reduction and voltage profile improvement, they may disrupt the performance of the conventional protection system due to bidirectional power flow and change of short‐circuit power.
Mahmoud Hojjaty +2 more
wiley +1 more source

