Examining the “Known Truths” in Cyber Threat Intelligence — The Case of STIX (English)
- New search for: Bromander, Siri
- New search for: Muller, Lilly Pijnenburg
- New search for: Eian, Martin
- New search for: Jøsang, Audun
- New search for: Bromander, Siri
- New search for: Muller, Lilly Pijnenburg
- New search for: Eian, Martin
- New search for: Jøsang, Audun
In:
15th International Conference on Cyber Warfare and Security (ICCWS 2020)
; 493-502
;
2020
-
ISBN:
- Conference paper / Print
-
Title:Examining the “Known Truths” in Cyber Threat Intelligence — The Case of STIX
-
Contributors:Bromander, Siri ( author ) / Muller, Lilly Pijnenburg ( author ) / Eian, Martin ( author ) / Jøsang, Audun ( author )
-
Conference:ICCWS ; 15. ; 2020 ; Norfolk, Va.
-
Published in:
-
Publisher:
- New search for: Curran Associates, Inc.
-
Place of publication:Red Hook, NY
-
Publication date:2020
-
ISBN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
- New search for: 54.38 / 89.83
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Prey-Predator Model for Countering Internet- assisted Radicalization and RecruitmentAdhikari, Naresh / Bushra, Naila / Ghimire, Amrita et al. | 2020
- 9
-
Blockchain-based Redistricting Evaluation ProtocolAdhikari, Naresh / Bushra, Naila / Ramkumar, Mahalingam et al. | 2020
- 18
-
A Layered Network Collapse Method in Cyber TerrorismAlhajjar, Elie / Morse, Steve et al. | 2020
- 23
-
Resilient Cybersecurity ArchitectureAlHamdani, Wasim A. et al. | 2020
- 33
-
Cyber Alliances and Proxy Cyber WarfareBarbosa, Jorge et al. | 2020
- 39
-
Cyber Warfare: Can there be Small Cyber Military Powers?Barbosa, Jorge et al. | 2020
- 47
-
An Examination in Social Engineering: The Susceptibility of Disclosing Private Security Information in College StudentsBleiman, Rachel / Rege, Aunshul et al. | 2020
- 57
-
Fake News and Deepfakes: A Dangerous Threat for 21st Century information SecurityBotha, Jonny / Pieterse, Heloise et al. | 2020
- 67
-
Electronic Healthcare Record and Cyber Security Threats: A Development of an Agile FrameworkBouazzaoui, Sarah / Daniels, Charles et al. | 2020
- 72
-
Scalable Verification of NP Problems in BlockchainBushra, Naila / Adhikari, Naresh / Ramkumar, Mahalingam et al. | 2020
- 82
-
A Warfare Domain Approach to the Disinformation ProblemCanan, Mustafa / Akil, Anthony et al. | 2020
- 92
-
Countering Disinformation Propaganda: Reverse Engineering the Experimental Implicit Learning ParadigmCanan, Mustafa / Canan, Daphne et al. | 2020
- 102
-
The Strategy of Persistent Engagement: From Single Domain to Cross-DomainsChen, Jim Q. et al. | 2020
- 110
-
Fingerprinting Vehicles With CAN Bus Data SamplesCrow, David R. / Graham, Scott R. / Borghetti, Brett J. et al. | 2020
- 119
-
Mathematically Modelling Cyber-Attacks Utilizing Engineering TechniquesEasttom, Chuck et al. | 2020
- 127
-
Applying Systems Engineering Principles to Penetration TestingEasttom, Chuck / Butler, William et al. | 2020
- 135
-
From Simple Scoring Towards a Meaningful Interpretation of Learning in Cvbersecurity ExercisesErnits, Margus / Maennel, Kaie / Mäses, Sten / Lepik, Toomas / Maennel, Olaf et al. | 2020
- 144
-
Intelligent based Framework for Detection of Fake News in the Social Network PlatformsFasola, Olusanjo / Ojeniyi, Joseph / Oyeniyi, Samuel et al. | 2020
- 155
-
Leveraging Serious Games in Air Force Multi-Domain Operations Education: A Pilot StudyFlack, Nathaniel / Voltz, Christopher / Dill, Richard / Lin, Alan / Reith, Mark et al. | 2020
- 165
-
Cyber Resilience through Machine Learning: Data ExfiltrationFletcher, Kieran / Smith, H. Anthony et al. | 2020
- 173
-
Connected Vehicle SecurityFrancia, III Guillermo A. et al. | 2020
- 182
-
Cyberwar as a New Type of War?Frantis, Petr et al. | 2020
- 187
-
A Strategic Roadmap for Cybersecurity Capability Engineering across Different EnvironmentsGcaza, Noluxolo / Mtsweni, Jabu et al. | 2020
- 195
-
An Analysis of Connected Cars Technology and SecurityGhafarian, Ahmad / Sardari, Saman et al. | 2020
- 204
-
Artificially Intelligent Systems and Human Rights: A Global PerspectiveGreiman, Virginia A. et al. | 2020
- 211
-
Information Policy Security Compliance in Dutch Local Government: Results from a Vignette SurveyHomburg, Vincent / Kokje, Jeroen et al. | 2020
- 219
-
Notre Dame Fire Conspiracism as Reflective of Russian Ideological Competition with the WestHotchkiss, Michael Bennett et al. | 2020
- 228
-
The Critical Need for Tool Validation before Using Malware Scanners in Digital ForensicsHughes, Nicolas / Varol, Cihan et al. | 2020
- 236
-
Avoiding the Pitfalls of an Artificial Reality (Is A. I. Real Enough)Hurley, John S. / Potter, Dorothy O. et al. | 2020
- 243
-
Toward an Ambidextrous Framework for Offensive Cyberspace Operations: A Theory, Policy and Practice PerspectiveHuskaj, Gazmend / Iftimie, Ion A. et al. | 2020
- 254
-
Anticipatory Ethics for Vulnerability DisclosureHuskaj, Gazmend / Wilson, Richard L. et al. | 2020
- 262
-
The Use of Signals Intelligence in Offensive Cyberspace Operations: An Anticipatory Ethical AnalysisIftimie, lon A. / Wilson, Richard L. et al. | 2020
- 270
-
Customers' Perception of Cybersecurity Threats Toward e-Banking Adoption and Retention: A Conceptual StudyJibril, Abdul Bashiru / Kwarteng, Michael Adu / Chovancova, Miloslava / Denanyoh, Richard et al. | 2020
- 277
-
A Fast Alert Correlation Method with Bayesian Feature ConstraintsKim, Minchul / Park, Youngwoo / Han, Insung / Cho, Sungyoung et al. | 2020
- 286
-
Crown in the Clouds: A Canadian Data Sovereignty CrisisKushwaha, Neal / Watson, Bruce W. et al. | 2020
- 296
-
Digital Forensic Readiness Framework for Software- Defined Networks Using a Trigger-Based Collection MechanismLagrasse, Maxime / Singh, Avinash / Munkhondya, Howard / Ikuesan, Adeyemi / Venter, Hein et al. | 2020
- 306
-
Representing Strategic Cyber and Information Warfare in Matrix GamesLee, Hyong / DeMuth, James et al. | 2020
- 316
-
Non-Kinetic Warfare: The New Game Changer in the Battle SpaceLehto, Martti / Henselmann, Gerhard et al. | 2020
- 326
-
Mini-Drones Swarms and Their Potential in Conflict SituationsLehto, Martti / Hutchinson, Bill et al. | 2020
- 335
-
Enhanced Channel-PUFs: The Advantages of Artificial Intelligence for Channel EstimationLipps, Christoph / Mallikarjun, Sachinkumar Bavikatti / Strufe, Mathias / Schotten, Hans Dieter et al. | 2020
- 346
-
Bring Your Own Device (BYOD) Information Security Risks: Case of LesothoMorolong, Mamoqenelo Priscilla / Shava, Fungai Bhunu / Gamundani, Attlee M. et al. | 2020
- 355
-
Complex Network Analysis for Evaluating Effects of Asymmetry Established by Closed National NetworksNikkarila, Juha-Pekka / Kuikka, Vesa et al. | 2020
- 363
-
Impact of Security and Trust as Factors that influence the Adoption and Use of Digital Technologies that Generate, Collect and Transmit User DataNwaiwu, Fortune / Kwarteng, Michael Adu / Jibril, Abdul Bashiru / Buřita, Ladislav / Pilik, Michal et al. | 2020
- 373
-
Defending Forward: An Exploration through the Lens of BiocybersecurityPalmer, Xavier-Lewis / Karahan, Saltuk et al. | 2020
- 380
-
Systemic Methodology for Cyber Offense and DefensePinto, C. Ariel / Zurasky, Matthew et al. | 2020
- 391
-
Distributed Authority as a Guiding set of Principles for Transnational Cyber Security GovernancePontbriand, Karine et al. | 2020
- 398
-
The New Role of the 'Next Generation' CFOPotter, Dorothy O. / Hurley, John S. et al. | 2020
- 402
-
Cyber-assets at Risk (CAR): The Cost of Personally identifiable Information Data BreachesPoyraz, Omer llker / Bouazzaoui, Sarah / Keskin, Omer / McShane, Michael / Pinto, C. Ariel et al. | 2020
- 411
-
Leveraging the Benefits of Big Data with Fast Data for Effective and Efficient Cybersecurity Analytics Systems: A Robust Optimisation ApproachRathod, Paresh / Hämäläinen, Timo et al. | 2020
- 423
-
International Information Power and Foreign Malign Influence in CyberspaceSchafer, Joseph H. et al. | 2020
- 431
-
Bug Bounties: Bottom-up Initiatives as Forms of Cyber Arms Control?Silomon, Jantje A. M. et al. | 2020
- 439
-
Modelling the Supply Chain: Trust but Verify in Complex SystemsSobb, Theresa / Sample, Char / Shelton, Cragin / Turnbull, Benjamin et al. | 2020
- 448
-
NetFlow Based Framework for Identifying Anomalous End User NodesVaarandi, Risto / Pihelgas, Mauno et al. | 2020
- 457
-
loT-based Adversarial Attack's Effect on Cloud Data Platform Services in a Smart Building ContextVähäkainu, Petri / Lehto, Martti / Kariluoto, Antti et al. | 2020
- 466
-
Cyber Probability of Kill: The Effectiveness of Malware in a Heterogeneous Software EnvironmentWebster, Brandon / Stenger, Matthew / Valcin, Alix / Coffman, Joel / Salazar, Carlos et al. | 2020
- 471
-
Who Hath Measured the (Proving) Ground: Variation in Offensive Capabilities Test and EvaluationWork, J. D. et al. | 2020
- 480
-
A Method for Teaching Open Source Intelligence (OSINT) Using Personalised Cloud-based ExercisesYari, Saber / Mäses, Sten / Maennel, Olaf et al. | 2020
- 493
-
Examining the “Known Truths” in Cyber Threat Intelligence — The Case of STIXBromander, Siri / Muller, Lilly Pijnenburg / Eian, Martin / Jøsang, Audun et al. | 2020
- 503
-
Career Development in Cyber Security: Bootcamp Training ProgramsCaliskan, Emin / Vaarandi, Risto et al. | 2020
- 512
-
An Anticipatory Ethical Analysis of Offensive Cyberspace OperationsHuskaj, Gazmend / Wilson, Richard L. et al. | 2020
- 521
-
Rising to the Challenge of Insider Threats for Middle PowersModini, Jessemyn / Zomeren, Mark Van / Fowler, Stuart / Joiner, Keith / Lynar, Tim et al. | 2020
- 530
-
Psychometric Modelling of Cybersecurity RolesPoteete, Paul Wyatt et al. | 2020
- 539
-
National Cyber Threat Prevention Mechanism as a part of the E-EWSSimola, Jussi / Lehto, Martti J. et al. | 2020
- 549
-
Beyond 2000: The Rise of Australian Cyber Warfare CapabilityWilliams, Andrew et al. | 2020
- 559
-
Cybersecurity Knowledge Requirements for Strategic Level Decision MakersGarcia-Granados, Fernando / Bahsi, Hayretdin et al. | 2020
- 569
-
A Review of Security System Assessment Tools Suitable for eHealth in NamibiaGerson, Naemi / Shava, Fungai Bhunu et al. | 2020
- 576
-
An Analysis of Social Networking ThreatsKahimise, Jennyphar / Shava, Fungai Bhunu et al. | 2020
- 584
-
A Case for a Dynamic Approach to Digital Forensic Readiness in an SDN PlatformMunkhondya, Howard / Ikuesan, Adeyemi R. / Venter, Hein S. et al. | 2020
- 597
-
Cyber Attack Grammars for Risk/Cost AnalysisPatten, Terry / Mitchell, Daniel / Call, Catherine et al. | 2020
- 609
-
Alternate Coupling for Targeted Supply Chain AttacksRohret, David M. / Jimenez, Abiud et al. | 2020
- 617
-
A Defined Digital Forensic Criteria for Cybercrime ReportingBaror, Stacey Omeleze / Ikuesan, Richard Adeyemi / Venter, Hein S. et al. | 2020
- 627
-
Digital Forensic Readiness Framework for Smart HomesPhilomin, Sebastien / Singh, Avinash / Ikuesan, Adeyemi / Venter, Hein et al. | 2020