Login / Signup

A scheme for the sticky policy representation supporting secure cyber-threat intelligence analysis and sharing.

Oleksii OsliakAndrea SaracinoFabio Martinelli
Published in: Inf. Comput. Secur. (2019)
Keyphrases
  • intelligence analysis
  • cyber security
  • security analysis
  • standard model
  • information systems
  • information sharing
  • real world
  • social networks
  • law enforcement