2018
DOI: 10.1016/j.jisa.2017.11.006
|View full text |Cite
|
Sign up to set email alerts
|

Towards privacy preserving threat intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
1
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 2 publications
0
6
0
Order By: Relevance
“…This means that there is a lack of contribution to defending against mobile APTs. This study identified 60 primary studies of which 40 primary studies focused on APT detection [1,3,[5][6][7]28,76,86,97,98,100,106,111,115,[124][125][126][127][128][129]134,[136][137][138][139]142,172,173,176], six primary studies focused on APT protection [4,91,92,118,121,125], four primary studies focused on APT mitigation [142][143][144][145], three primary studies focused on APT identification [98,107,146], and [116] focused on the detection and response to APTs as shown in Table 5.…”
Section: Rq2: What Are the Proposed Defensive Mechanisms Available To...mentioning
confidence: 99%
See 2 more Smart Citations
“…This means that there is a lack of contribution to defending against mobile APTs. This study identified 60 primary studies of which 40 primary studies focused on APT detection [1,3,[5][6][7]28,76,86,97,98,100,106,111,115,[124][125][126][127][128][129]134,[136][137][138][139]142,172,173,176], six primary studies focused on APT protection [4,91,92,118,121,125], four primary studies focused on APT mitigation [142][143][144][145], three primary studies focused on APT identification [98,107,146], and [116] focused on the detection and response to APTs as shown in Table 5.…”
Section: Rq2: What Are the Proposed Defensive Mechanisms Available To...mentioning
confidence: 99%
“…In addition, APTs can be tackled using game theory. Game theory techniques have been utilized to detect or mitigate APTs on IoT [1,82], computers [98,145], and in general [135,151,152]. In addition, game theory has been used with risk management approaches to identify the APT in fog computing [111] and IoT [107].…”
Section: Rq2: What Are the Proposed Defensive Mechanisms Available To...mentioning
confidence: 99%
See 1 more Smart Citation
“…It embraces all evidence‐based knowledge about existing or emerging threats, which can be used to support cyberdefense decisions . TI has recently attracted great attention, including vendors of security solutions who offer diverse TI solutions …”
Section: Collaborative Security Information Sharing Situation Awarementioning
confidence: 99%
“…Technical TI is the lowest‐level data, gathered and processed by technical tools . An important factor that should be considered in the TI domain is users' privacy as a considerable amount of data delivered to TI services originally contain identifiers of their source …”
Section: Collaborative Security Information Sharing Situation Awarementioning
confidence: 99%