Cyber Threat Intelligence最新文献

筛选
英文 中文
Things to Consider When Implementing CTI 实现CTI时需要考虑的事项
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_6
A. Roberts
{"title":"Things to Consider When Implementing CTI","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_6","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_6","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125574068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
I Already Pay for Vendor X – Should I Bother with CTI? 我已经为供应商X付款了,我还需要CTI吗?
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_8
A. Roberts
{"title":"I Already Pay for Vendor X – Should I Bother with CTI?","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_8","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_8","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Structured Intelligence – What Does It Even Mean? 结构化智能——它到底是什么意思?
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_3
A. Roberts
{"title":"Structured Intelligence – What Does It Even Mean?","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_3","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_3","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Cybersecurity Wild West 网络安全的狂野西部
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_1
A. Roberts
{"title":"The Cybersecurity Wild West","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_1","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_1","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129214765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Threat Intelligence – What Does It Even Mean? 网络威胁情报——它到底是什么意思?
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_2
A. Roberts
{"title":"Cyber Threat Intelligence – What Does It Even Mean?","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_2","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_2","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Importance of OSINT OSINT的重要性
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_7
A. Roberts
{"title":"The Importance of OSINT","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_7","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_7","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131754473","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
How Do I Implement This? (Regardless of Budget) 如何实现这一点?(不论预算)
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_5
A. Roberts
{"title":"How Do I Implement This? (Regardless of Budget)","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_5","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_5","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114769303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers 网络威胁情报:ciso和安全管理人员的严肃指南
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6
A. Roberts
{"title":"Cyber Threat Intelligence: The No-Nonsense Guide for CISOs and Security Managers","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123445117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Determining What Your Business Needs 确定你的业务需要什么
Cyber Threat Intelligence Pub Date : 1900-01-01 DOI: 10.1007/978-1-4842-7220-6_4
A. Roberts
{"title":"Determining What Your Business Needs","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_4","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_4","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信