{"title":"以企业为中心的情报:网络威胁情报及常见漏洞和暴露的优先排序计划","authors":"Shanhsin Lee, Shiuhpyng Winston Shieh, Mengru Tsai","doi":"10.1109/mc.2024.3393250","DOIUrl":null,"url":null,"abstract":"This article presents a prioritization scheme aimed at assisting enterprises in strengthening their cybersecurity posture by efficiently addressing cyberthreat intelligence and common vulnerabilities and exposures aligned with their specific risk landscape.","PeriodicalId":10623,"journal":{"name":"Computer","volume":"25 1","pages":""},"PeriodicalIF":2.0000,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Enterprise-Centric Intelligence: A Prioritization Scheme for Cyberthreat Intelligence and Common Vulnerabilities and Exposures\",\"authors\":\"Shanhsin Lee, Shiuhpyng Winston Shieh, Mengru Tsai\",\"doi\":\"10.1109/mc.2024.3393250\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This article presents a prioritization scheme aimed at assisting enterprises in strengthening their cybersecurity posture by efficiently addressing cyberthreat intelligence and common vulnerabilities and exposures aligned with their specific risk landscape.\",\"PeriodicalId\":10623,\"journal\":{\"name\":\"Computer\",\"volume\":\"25 1\",\"pages\":\"\"},\"PeriodicalIF\":2.0000,\"publicationDate\":\"2024-06-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Computer\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1109/mc.2024.3393250\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1109/mc.2024.3393250","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
Enterprise-Centric Intelligence: A Prioritization Scheme for Cyberthreat Intelligence and Common Vulnerabilities and Exposures
This article presents a prioritization scheme aimed at assisting enterprises in strengthening their cybersecurity posture by efficiently addressing cyberthreat intelligence and common vulnerabilities and exposures aligned with their specific risk landscape.
期刊介绍:
Computer, the flagship publication of the IEEE Computer Society, publishes peer-reviewed articles written for and by computer researchers and practitioners representing the full spectrum of computing and information technology, from hardware to software and from emerging research to new applications. The aim is to provide more technical substance than trade magazines and more practical ideas than research journals. Computer seeks to deliver useful information for all computing professionals and students, including computer scientists, engineers, and practitioners of all levels.