peer reviewedThe ever-increasing scale and complexity of cyber attacks and cyber-criminal activities necessitate secure and effective sharing of cyber threat intelligence (CTI) among a diverse set of stakeholders and communities. CTI sharing platforms are becoming indispensable tools for cooperative and collaborative cybersecurity. Nevertheless, despite the growing research in this area, the emphasis is often placed on the technical aspects, incentives, or implications associated with CTI sharing, as opposed to investigating challenges encountered by users of such platforms. To date, user experience (UX) aspects remain largely unexplored. This paper offers a unique contribution towards understanding the constraining and enabling factors ...
Abstract—Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The e...
peer reviewedCyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. ...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Today, the socio-political and technological transformation of mankind is being challenged by a seri...
Today threat landscape evolving at the rapid rate with much organization continuously face complex a...
Threat intelligence helps businesses and organisations make the right decisions in their fight again...
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform...
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often do not have ...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
In the last couple of years, organizations have demonstrated an increased willingness to exchange in...
Abstract—Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The e...
peer reviewedCyber Threat Intelligence (CTI) sharing platforms are valuable tools in cybersecurity. ...
Cyber Threat Intelligence (CTI) sharing has become a novel weapon in the arsenal of cyber defenders ...
Cyber security information sharing is increasingly playing an important role in improving the organi...
Today, the socio-political and technological transformation of mankind is being challenged by a seri...
Today threat landscape evolving at the rapid rate with much organization continuously face complex a...
Threat intelligence helps businesses and organisations make the right decisions in their fight again...
This article describes three collective intelligence dynamics observed on ThreatFox, a free platform...
Small-and medium-sized enterprises (SMEs) frequently experience cyberattacks, but often do not have ...
Frequent data breaches and security incidents show that organizations face challenges in protecting ...
In the last couple of years, organizations have demonstrated an increased willingness to exchange in...
Abstract—Cyber threat intelligence (CTI) is widely recognized as an important area in cybersecurity ...
The file attached to this record is the author's final peer reviewed version. The Publisher's final ...
In this thesis, extensions were developed for two commonly used threat intelligence platforms. The e...