Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs.
Spike E. DogAlex TweedLeRoy RouseBill ChuDuan QiYueqi HuJing YangEhab Al-ShaerPublished in: ICCCN (2016)
Keyphrases
- decision makers
- strategic and tactical
- decision making
- cyber crime
- case study
- strategic decisions
- intrusion detection system
- intrusion detection
- information processing
- crime investigation
- cyber security
- test bed
- artificial intelligence
- knowledge sharing
- collective intelligence
- knowledge management
- sir model
- countermeasures
- information sharing
- information systems
- law enforcement agencies
- log analysis
- cyber physical
- human intelligence
- data sharing