Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs

Spike E. Dog, Alex Tweed, LeRoy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer. Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. In 25th International Conference on Computer Communication and Networks, ICCCN 2016, Waikoloa, HI, USA, August 1-4, 2016. pages 1-6, IEEE, 2016. [doi]

@inproceedings{DogTRCQHYA16,
  title = {Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs},
  author = {Spike E. Dog and Alex Tweed and LeRoy Rouse and Bill Chu and Duan Qi and Yueqi Hu and Jing Yang and Ehab Al-Shaer},
  year = {2016},
  doi = {10.1109/ICCCN.2016.7568578},
  url = {http://dx.doi.org/10.1109/ICCCN.2016.7568578},
  researchr = {https://researchr.org/publication/DogTRCQHYA16},
  cites = {0},
  citedby = {0},
  pages = {1-6},
  booktitle = {25th International Conference on Computer Communication and Networks, ICCCN 2016, Waikoloa, HI, USA, August 1-4, 2016},
  publisher = {IEEE},
  isbn = {978-1-5090-2279-3},
}