default search action
"Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs."
Spike E. Dog et al. (2016)
- Spike E. Dog, Alex Tweed, LeRoy Rouse, Bill Chu, Duan Qi, Yueqi Hu, Jing Yang, Ehab Al-Shaer:
Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs. ICCCN 2016: 1-6
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.