Login / Signup
Lessons from Using the I-Corps Methodology to Understand Cyber Threat Intelligence Sharing.
Josiah Dykstra
Matt Fante
Paul Donahue
Dawn Varva
Linda Wilk
Amanda Johnson
Published in:
CSET @ USENIX Security Symposium (2019)
Keyphrases
</>
cyber crime
knowledge sharing
lessons learned
information sharing
deeper understanding
human beings
crime investigation
information technology
anomaly detection
data sharing
cyber security
law enforcement agencies
intelligence analysts