Last Updated on March 14, 2023 by Paganoto
Computer network – Wikipedia
Computer network – Wikipedia
A blockchain based cybersecurity platform can secure connected devices by using digital signatures to register them into the de-centralized
Blockchain-Based Cyber Threat Intelligence Sharing … – MDPI
Blockchain-Based Cyber Threat Intelligence Sharing … – MDPI
by S Gong · 2020 · Cited by 17 — The CTI system extracts information such as attack patterns, identifiers, malware, attackers, and tactic-technique-procedures (TTP) from various …
The Future Use Cases of Blockchain for Cybersecurity
The Future Use Cases of Blockchain for Cybersecurity
Blockchain can be used to create a standard security protocol. For enabling cross-messenger communication capabilities, blockchain can be used …
Blockchain Technology as a Cyber Threat Intelligence …
Blockchain Technology as a Cyber Threat Intelligence …
Blockchain Technology as a Cyber Threat Intelligence Sharing Platform · Improve cybersecurity awareness of ongoing and past cyber threats; · Tune …
Cyber threat intelligence sharing for different scenarios using…
Cyber threat intelligence sharing for different scenarios using…
Blockchain is a prevailing technology that can help to alleviate the security risks of AI applications. These two technologies are complementing each other as …
Potential Use Cases of Blockchain Technology for Cybersecurity
Potential Use Cases of Blockchain Technology for Cybersecurity
Blockchain technology can be used to develop a standard security protocol, as it is a sounder alternative to end-to-end encryption. It can also …
Challenges and Opportunities of Blockchain for Cyber Threat …
Challenges and Opportunities of Blockchain for Cyber Threat …
by K Dunnett · 2022 — In response, a significant amount of research has focused on developing efficient Cyber Threat Intelligence (CTI) sharing platforms.
Neural network and blockchain based technique for cyber …
Neural network and blockchain based technique for cyber …
by R Graf · 2018 · Cited by 21 — Neural network and blockchain based technique for cyber threat intelligence and situational awareness | IEEE Conference Publication | IEEE Xplore.
TIIA: A blockchain-enabled Threat Intelligence Integrity Audit …
TIIA: A blockchain-enabled Threat Intelligence Integrity Audit …
by W Zhang · 2022 · Cited by 1 — In this paper, a blockchain-enabled Threat Intelligence Integrity Audit (TIIA) scheme for IIoT is proposed. This scheme can audit the integrity of threat …
Cybersecurity threat intelligence knowledge exchange based …
Cybersecurity threat intelligence knowledge exchange based …
by R Riesco Granadino · 2019 · Cited by 28 — We propose the exchange of the analysis of the data (knowledge or advanced intelligence) instead of the exchange of the data itself. (i) A new incentive model …
Pagaonoto is an SEO editor and cryptocurrency researcher for various publications.