Publication:
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections
| dc.contributor.author | Preuveneers, Davy | |
| dc.contributor.author | Joosen, Wouter | |
| dc.contributor.imecauthor | Joosen, Wouter | |
| dc.date.accessioned | 2024-04-22T08:08:17Z | |
| dc.date.available | 2024-02-09T17:25:57Z | |
| dc.date.available | 2024-04-22T08:08:17Z | |
| dc.date.issued | 2023 | |
| dc.description.wosFundingText | This research is partially funded by the Research Fund KU Leuven, by the Flemish Research Programme Cybersecurity, and by VLAIO through the CS ICON project "Cyber Security Artificial Intelligence" (CSAI) . Work for this paper was supported by the European Commission through the H2020 project CyberSec4Europe (https:// www.cybersec4europe.eu/) under grant agreement 830929 and the Horizon Europe project KINAITICS (https://kinaitics.eu/) under grant agreement 101070176. | |
| dc.identifier.doi | 10.1016/j.cose.2023.103505 | |
| dc.identifier.issn | 0167-4048 | |
| dc.identifier.uri | https://imec-publications.be/handle/20.500.12860/43525 | |
| dc.publisher | ELSEVIER ADVANCED TECHNOLOGY | |
| dc.source.beginpage | Art. 103505 | |
| dc.source.endpage | N/A | |
| dc.source.issue | N/A | |
| dc.source.journal | COMPUTERS & SECURITY | |
| dc.source.numberofpages | 19 | |
| dc.source.volume | 135 | |
| dc.title | Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections | |
| dc.type | Journal article | |
| dspace.entity.type | Publication | |
| Files | ||
| Publication available in collections: |