ResearchTrend.AI
  • Communities
  • Connect sessions
  • AI calendar
  • Organizations
  • Join Slack
  • Contact Sales
Papers
Communities
Social Events
Terms and Conditions
Pricing
Contact Sales
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2026 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2103.03530
  4. Cited By
Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing
  Standards, and Ontologies within Cyber Threat Intelligence
v1v2v3v4v5 (latest)

Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence

European Intelligence and Security Informatics Conference (EISIC), 2017
5 March 2021
Vasileios Mavroeidis
Siri Bromander
ArXiv (abs)PDFHTML

Papers citing "Cyber Threat Intelligence Model: An Evaluation of Taxonomies, Sharing Standards, and Ontologies within Cyber Threat Intelligence"

28 / 28 papers shown
Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence
Uncovering Vulnerabilities of LLM-Assisted Cyber Threat Intelligence
Y. Meng
Luoxi Tang
Feiyang Yu
Jinyuan Jia
Guanhua Yan
Ping Yang
Zhaohan Xi
213
1
0
28 Sep 2025
Incorporating Taxonomies of Cyber Incidents Into Detection Networks for Improved Detection Performance
Incorporating Taxonomies of Cyber Incidents Into Detection Networks for Improved Detection Performance
Ryan Warnick
35
0
0
13 Aug 2025
How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided Information
How Do Mobile Applications Enhance Security? An Exploratory Analysis of Use Cases and Provided InformationACM Southeast Regional Conference (ACMSE), 2025
Irdin Pekaric
Clemens Sauerwein
Simon Laichner
Ruth Breu
189
2
0
19 Apr 2025
AttackSeqBench: Benchmarking the Capabilities of LLMs for Attack Sequences Understanding
AttackSeqBench: Benchmarking the Capabilities of LLMs for Attack Sequences Understanding
Javier Yong
Javier Yong
Yunshan Ma
Kuei Chen
Anis Yusof
Zhenkai Liang
E. Chang
515
2
0
05 Mar 2025
Towards an Improved Taxonomy of Attacks related to Digital Identities
  and Identity Management Systems
Towards an Improved Taxonomy of Attacks related to Digital Identities and Identity Management Systems
Daniela Pöhn
Wolfgang Hommel
196
4
0
23 Jul 2024
Review of Generative AI Methods in Cybersecurity
Review of Generative AI Methods in Cybersecurity
Yagmur Yigit
William J. Buchanan
Madjid G Tehrani
Leandros A. Maglaras
AAML
510
44
0
13 Mar 2024
TIPS: Threat Sharing Information Platform for Enhanced Security
TIPS: Threat Sharing Information Platform for Enhanced Security
Lakshmi Rama Kiran Pasumarthy
Hisham Ali
William J. Buchanan
Jawad Ahmad
A. Jøsang
Vasileios Mavroeidis
M. Lemoudden
99
1
0
08 Mar 2024
APT-MMF: An advanced persistent threat actor attribution method based on
  multimodal and multilevel feature fusion
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion
Nan Xiao
Bo Lang
Ting Wang
Yikai Chen
171
23
0
20 Feb 2024
Assessing the Threat Level of Software Supply Chains with the Log Model
Assessing the Threat Level of Software Supply Chains with the Log Model
Luis Soeiro
Thomas Robert
Stefano Zacchiroli
223
1
0
20 Nov 2023
MITRE ATT&CK: State of the Art and Way Forward
MITRE ATT&CK: State of the Art and Way ForwardACM Computing Surveys (ACM Comput. Surv.), 2023
Bader Al-Sada
Alireza Sadighian
Gabriele Oligeri
240
64
0
27 Aug 2023
Creating Android Malware Knowledge Graph Based on a Malware Ontology
Creating Android Malware Knowledge Graph Based on a Malware Ontology
A. Sabbah
Mohammed Kharma
Mustafa Jarrar
85
0
0
04 Aug 2023
Towards a better labeling process for network security datasets
Towards a better labeling process for network security datasets
Sebastian Garcia
Veronica Valeros
206
3
0
02 May 2023
SoK: The MITRE ATT&CK Framework in Research and Practice
SoK: The MITRE ATT&CK Framework in Research and Practice
Shanto Roy
E. Panaousis
C. Noakes
Aron Laszka
S. Panda
G. Loukas
239
15
0
14 Apr 2023
A data-driven analysis of UK cyber defence
A data-driven analysis of UK cyber defence
J. McKeown
44
0
0
13 Mar 2023
Current Challenges of Cyber Threat and Vulnerability Identification
  Using Public Enumerations
Current Challenges of Cyber Threat and Vulnerability Identification Using Public EnumerationsARES (ARES), 2022
Lukáš Sadlek
Pavel Čeleda
Daniel Tovarňák
188
6
0
29 Jun 2022
CELEST: Federated Learning for Globally Coordinated Threat Detection
CELEST: Federated Learning for Globally Coordinated Threat DetectionIEEE Transactions on Information Forensics and Security (IEEE TIFS), 2022
Talha Ongun
Simona Boboila
Alina Oprea
Tina Eliassi-Rad
Jason Hiser
Jack W. Davidson
FedML
445
6
0
23 May 2022
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a
  Collaborative IoT Intrusion Detection
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion DetectionComputers & electrical engineering (CEE), 2022
Mohanad Sarhan
Wai Weng Lo
S. Layeghy
Marius Portmann
340
110
0
08 Apr 2022
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex
  Models
cyberaCTIve: a STIX-based Tool for Cyber Threat Intelligence in Complex Models
R. Czekster
Roberto Metere
C. Morisset
205
3
0
07 Apr 2022
A Blockchain-Enabled Incentivised Framework for Cyber Threat
  Intelligence Sharing in ICS
A Blockchain-Enabled Incentivised Framework for Cyber Threat Intelligence Sharing in ICS
Kathy Nguyen
S. Pal
Zahra Jadidi
A. Dorri
Raja Jurdak
169
15
0
01 Dec 2021
Vulnerability Characterization and Privacy Quantification for
  Cyber-Physical Systems
Vulnerability Characterization and Privacy Quantification for Cyber-Physical Systems
Arpan Bhattacharjee
S. Badsha
Md Tamjid Hossain
Charalambos Konstantinou
Xueping Liang
233
3
0
28 Oct 2021
On the Integration of Course of Action Playbooks into Shareable Cyber
  Threat Intelligence
On the Integration of Course of Action Playbooks into Shareable Cyber Threat Intelligence
Vasileios Mavroeidis
Pavel Eis
M. Zádník
M. Caselli
Bret Jordan
81
16
0
20 Oct 2021
Knowledge mining of unstructured information: application to
  cyber-domain
Knowledge mining of unstructured information: application to cyber-domainScientific Reports (Sci Rep), 2021
Tuomas Takko
Kunal Bhattacharya
M. Lehto
Pertti Jalasvirta
Aapo Cederberg
K. Kaski
266
9
0
08 Sep 2021
Generating Cyber Threat Intelligence to Discover Potential Security
  Threats Using Classification and Topic Modeling
Generating Cyber Threat Intelligence to Discover Potential Security Threats Using Classification and Topic Modeling
Md. Imran Hossen
Ashraful Islam
Farzana Anowar
Eshtiak Ahmed
M. M. Rahman
Xiali
Hei
241
7
0
16 Aug 2021
Data-Driven Threat Hunting Using Sysmon
Data-Driven Threat Hunting Using SysmonInternational Conference on Cryptography, Security and Privacy (ICCSP), 2018
Vasileios Mavroeidis
A. Jøsang
59
48
0
28 Mar 2021
Threat Actor Type Inference and Characterization within Cyber Threat
  Intelligence
Threat Actor Type Inference and Characterization within Cyber Threat IntelligenceInternational Conference on Cyber Conflict (CyCon), 2021
Vasileios Mavroeidis
R. Hohimer
Timothy Casey
A. Jøsang
149
34
0
03 Mar 2021
Security audit logging in microservice-based systems: survey of
  architecture patterns
Security audit logging in microservice-based systems: survey of architecture patternsVoprosy kiberbezopasnosti (VK), 2021
A. Barabanov
Denis Makrushin
61
4
0
18 Feb 2021
MALOnt: An Ontology for Malware Threat Intelligence
MALOnt: An Ontology for Malware Threat Intelligence
Nidhi Rastogi
Sharmishtha Dutta
Mohammed J Zaki
Alex Gittens
Charu C. Aggarwal
189
54
0
20 Jun 2020
Intelligence-based Cybersecurity Awareness Training- an Exploratory
  Project
Intelligence-based Cybersecurity Awareness Training- an Exploratory Project
Tam n. Nguyen
Lydia Sbityakov
S. Scoggins
119
4
0
11 Dec 2018
1
Page 1 of 1