Cited By
View all- Wagner TPalomar EMahbub KAbdallah A(2017)Relevance Filtering for Shared Cyber Threat Intelligence (Short Paper)Information Security Practice and Experience10.1007/978-3-319-72359-4_35(576-586)Online publication date: 8-Dec-2017
Cyber security and threat information sharing efforts involve a variety of groups of practicioners and stakeholders. This paper presents a methodology for analyzing information sharing efforts, to determine whether and how well the efforts will succeed. ...
Timely detection and effective treatment of cyber-attacks for protecting personal and sensitive data from unauthorized disclosure constitute a core demand of citizens and a legal obligation of organizations that collect and process personal data. ...
Cyber-attacks affect every aspect of our lives. These attacks have serious consequences, not only for cyber-security, but also for safety, as the cyber and physical worlds are increasingly linked. Providing effective cyber-security requires ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in