{"title":"I Already Pay for Vendor X – Should I Bother with CTI?","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_8","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_8","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126877805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Structured Intelligence – What Does It Even Mean?","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_3","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_3","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133533831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber Threat Intelligence – What Does It Even Mean?","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_2","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_2","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131702034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How Do I Implement This? (Regardless of Budget)","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_5","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_5","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114769303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Determining What Your Business Needs","authors":"A. Roberts","doi":"10.1007/978-1-4842-7220-6_4","DOIUrl":"https://doi.org/10.1007/978-1-4842-7220-6_4","url":null,"abstract":"","PeriodicalId":130197,"journal":{"name":"Cyber Threat Intelligence","volume":"354 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122796140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}