default search action
2nd WISCS@CCS 2015: Denver, Colorado, USA
- Indrajit Ray, Tomas Sander, Moti Yung:
Proceedings of the 2nd ACM Workshop on Information Sharing and Collaborative Security, WISCS 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3822-6
Keynote Address
- Freddy Dezeure:
Real World Information Exchange: Challenges and Insights. 1
Automated Intelligence Creation and Blacklists
- Bronwyn Woods, Samuel J. Perl, Brian Lindauer:
Data Mining for Efficient Collaborative Information Discovery. 3-12 - Leigh Metcalf, Jonathan M. Spring:
Blacklist Ecosystem Analysis: Spanning Jan 2012 to Jun 2014. 13-22
Information Sharing Case Studies
- Jon C. Haass, Gail-Joon Ahn, Frank Grimmelmann:
ACTRA: A Case Study for Threat Information Sharing. 23-26 - Stuart Murdoch, Nick Leaver:
Anonymity vs. Trust in Cyber-Security Collaboration. 27-29
Foundations and Economic Models for Information Sharing
- Stefan Laube, Rainer Böhme:
Mandatory Security Information Sharing with Authorities: Implications on Investments in Internal Controls. 31-42 - Sarah Brown, Joep Gommers, Oscar Serrano Serrano:
From Cyber Security Information Sharing to Threat Management. 43-49
HCI and Actioning of Shared Data
- Tomas Sander, Joshua M. Hailpern:
UX Aspects of Threat Information Sharing Platforms: An Examination & Lessons Learned Using Personas. 51-59 - Syam Appala, Nancy Cam-Winget, David A. McGrew, Jyoti Verma:
An Actionable Threat Intelligence system using a Publish-Subscribe communications model. 61-70
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.