Publisher
Springer International Publishing
Reference30 articles.
1. Chismon, D., Ruks, M.: Threat intelligence: collecting, analysing, evaluating. MWR InfoSecurity 3(2), 36–42 (2015)
2. Schlette, D.: Cyber threat intelligence. In: Jajodia, S., Samarati, P., Yung, M. (eds.) Encyclopedia of Cryptography, Security and Privacy, pp. 1–3. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-642-27739-9_1716-1
3. Nespoli, P., Papamartzivanos, D., Mármol, F.G., Kambourakis, G.: Optimal countermeasures selection against cyber attacks: a comprehensive survey on reaction frameworks. IEEE Commun. Surv. Tutor. 20(2), 1361–1396 (2017)
4. Groenewegen, A., Janssen, J.S.: TheHive project: the maturity of an open-source security incident response platform (2021)
5. Berrueta, E., Morato, D., Magaña, E., Izal, M.: Open repository for the evaluation of ransomware detection tools. IEEE Access 8, 65658–65669 (2020)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献