| [1] |
TOUNSI W. What is cyber threat intelligence and how is it evolving[M]//TOUNSI W. Cyber-Vigilance and Digital Trust: Cyber Security in the Era of Cloud Computing and IoT. London, Hoboken: ISTE Ltd., John Wiley & Sons, Inc., 2019.
|
| [2] |
VERIZON. 2020 Data breach investigations report[R]. NewYork: VERIZON, 2020.
|
| [3] |
李留英.欧盟网络威胁情报共享进展及启示研究[J].情报杂志, 2021,40(5): 8-15.
|
| [4] |
JUAN A G, COSTIN R, KURT B. Threat predictions for 2018[R]. Moscow:Kaspersky Security Bulletin, 2018.
|
| [5] |
ZHAO W Y, WHITE G. Designing a formal model facilitating collaborative information sharing for community cyber security[C]//2014 47th Hawaii International Conference on System Sciences, January 6-9, 2014,Waikoloa, HI, USA. IEEE, 2014: 1987-1996.
|
| [6] |
VAKILINIA I, TOSH D K, SENGUPTA S. Privacy-preserving cybersecurity information exchange mechanism[C]//2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems(SPECTS), July 9-12, 2017, Seattle, WA, USA. IEEE, 2017:15-21.
|
| [7] |
VAKILINIA I, TOSH D K, SENGUPTA S. Attribute based sharing in cybersecurity information exchange framework[C]//2017 International Symposium on Performance Evaluation of Computer and Telecommunication Systems(SPECTS), July 9-12, 2017, Seattle, WA, USA. IEEE,2017: 61-66.
|
| [8] |
BADSHA S, VAKILINIA I, SENGUPTA S. Privacy preserving cyber threat information sharing and learning for cyber defense[C]//2019 IEEE 9th Annual Computing and Communication Workshop and Conference,January 7-9, 2019, Las Vegas, NV, USA. IEEE, 2019: 708-714.
|
| [9] |
MARTINELLI F, OSLIAK O, SARACINO A. Towards general scheme for data sharing agreements empowering privacy-preserving data analysis of structured CTI[C]//International Workshop on Security and Privacy Requirements Engineering,International Workshop on the Security of Industrial Control Systems and Cyber-Physical System, September 6-17, 2018, Barcelona, Spain. Cham: Springer, 2019: 192-212.
|
| [10] |
LIN Y, WANG H, YANG B W, et al. A blackboard sharing mechanism for community cyber threat intelligence based on multi-agent system[C]// International Conference on Machine Learning for Cyber Security, September 19-21, 2019, Xi′an, China. Cham: Springer, 2019: 253-270.
|
| [11] |
RAWAT D B, NJILLA L, KWIAT K, et al. iShare: blockchain-based privacy-aware multi-agent information sharing games for cybersecurity[C]//2018 International Conference on Computing, Networking and Communications(ICNC), March 5-8, 2018, Maui, HI, USA. IEEE, 2018:425-431.
|
| [12] |
HOMAN D, SHIEL I, THORPE C. A new network model for cyberthreat intelligence sharing using blockchain technology[C]//2019 10th IFIP International Conference on New Technologies, Mobility and Security,June 24-26, 2019, Canary Islands, Spain. IEEE, 2019: 1-6.
|
| [13] |
PUROHIT S, CALYAM P, WANG S J, et al. DefenseChain: consortium blockchain for cyber threat intelligence sharing and defense [C]//2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), September 28-30, 2020, Paris, France. IEEE, 2020: 112-119.
|
| [14] |
黄克振,连一峰,冯登国, 等. 基于区块链的网络安全威胁情报共享模型[J].计算机研究与发展, 2020, 57(4): 836-846.
|
| [15] |
周文刚, 冯贵兰. 基于区块链的通航维护信息系统研究[J]. 电子制作, 2018(11): 46-48.
|
| [16] |
罗良翌,雷圆方.基于区块链的民航共享物流平台设计[J]. 电子设计工程, 2020, 28(17): 127-131.
|
| [17] |
宋云雪,吕杰.基于区块链的航空器维修任务发布系统[J]. 实验技术与管理, 2020, 37(8): 50-53.
|
| [18] |
国家市场监督管理总局, 国家标准化管理委员会. 信息安全技术网络安全威胁信息格式规范: GB/T 36643—2018[S].北京:中国标准出版社, 2018.
|
| [19] |
RIVEST R L, SHAMIR A, ADLEMAN L. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of the ACM, 1978, 21(2): 120-126.
|
| [20] |
ZHOU L D, MARSH M A, SCHNEIDER F B, et al. Distributed blinding for distributed ElGamal re-encryption[C]//25th IEEE International Conference on Distributed Computing Systems, June 6-10, 2005, Columbus,OH, USA. IEEE, 2005: 824.
|