Cyber Threat Intelligence Sharing: A Survey
Saved in:
| Published in | Journal of information engineering and applications |
|---|---|
| Format | Journal Article |
| Language | English |
| Online Access | Get full text |
| ISSN | 2224-5782 |
| DOI | 10.7176/jiea/15-2-08 |
Cover
| BookMark | eNotjz1PwzAUAD2UoRQ2foB3ZGq_xLHDVkV8VKrE0OzWs_3SBhlTmRaUfw8VnU63nHTXbJY_MzF2p-SDUaZZvo-ES6UFCGlnbA4AtdDGwpzdd5Onwvt9ITzydT5SSuOOciC-3WMZ8-6Rr_j2VL5pumFXA6Yvur1wwfrnp757FZu3l3W32ohgtBXo68qrCD5429igo_ZxCHFozJ_U2Ia2rlDp4I0CAhMNWCmH1gN4G6xR1YKJ_-wpH3D6wZTcoYwfWCanpDv_uPOPU9qBk7b6BS_EQ1c |
|---|---|
| ContentType | Journal Article |
| DBID | ADTOC UNPAY |
| DOI | 10.7176/jiea/15-2-08 |
| DatabaseName | Unpaywall for CDI: Periodical Content Unpaywall |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository |
| DeliveryMethod | fulltext_linktorsrc |
| ExternalDocumentID | 10.7176/jiea/15-2-08 |
| GroupedDBID | ADTOC UNPAY |
| ID | FETCH-LOGICAL-c758-ab43b1d2bcb868c5d5bdfcdf678c54a9c943a15cb712e27d72800f9b22b8c8713 |
| IEDL.DBID | UNPAY |
| ISSN | 2224-5782 |
| IngestDate | Sat Oct 11 07:05:43 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c758-ab43b1d2bcb868c5d5bdfcdf678c54a9c943a15cb712e27d72800f9b22b8c8713 |
| OpenAccessLink | https://proxy.k.utb.cz/login?url=https://iiste.org/Journals/index.php/JIEA/article/download/63468/65600 |
| ParticipantIDs | unpaywall_primary_10_7176_jiea_15_2_08 |
| PublicationTitle | Journal of information engineering and applications |
| Score | 1.8461142 |
| SourceID | unpaywall |
| SourceType | Open Access Repository |
| Title | Cyber Threat Intelligence Sharing: A Survey |
| URI | https://iiste.org/Journals/index.php/JIEA/article/download/63468/65600 |
| UnpaywallVersion | publishedVersion |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpZ3NS8MwGMbD2A6e_EBFRaUH8SJZ1zRJU29lbGwDh-AG81TyJqlfoxtzVeZfb7LWMTwJ3lNInzS870PS34PQFeFCglL2480oxTQEwHFkAmxU4DIqQ8nW-OK7Ie-N6WDCJjXU3fwL415ufYJfNWTv_hob6FgR_qDfSfxKUV87mPxMap-HlAvfQWSsdW9wZnvyOmqMh_fJo0uWszUKO2Z7eevduhfuv74Y6QcME-xSJXeKfC5Xn3I63aos3T309DOn8kLJW7NYQlN9_cI1_n_S-2i3esxLymEHqGbyQ3TTXoFZeKNn1z56_S1Ep-dozra03XqJ91AsPszqCI26nVG7h6sIBaysEcASrPqBJqBAcKGYZqAzpTNboRSjMlYxDWXAFEQBMSTSLquqlcVACAhlrVR4jOr5LDcnyDORCE2ccbvpBaVSiwxEC-z210pKYNkput7omM5LUkZqHYYTPHWCpwFLSdoSZ38deI7qy0VhLmzRX8JltaLfbGKwpQ |
| linkProvider | Unpaywall |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpZ3NS8MwGMbD2A6e_EBFRaUH8SJZ1zRJU29lbGwDh-AG81TyJqlfoxtzVeZfb7LWMTwJ3lNInzS870PS34PQFeFCglL2480oxTQEwHFkAmxU4DIqQ8nW-OK7Ie-N6WDCJjXU3fwL415ufYJfNWTv_hob6FgR_qDfSfxKUV87mPxMap-HlAvfQWSsdW9wZnvyOmqMh_fJo0uWszUKO2Z7eevduhfuv74Y6QcME-xSJXeKfC5Xn3I63aos3T309DOn8kLJW7NYQlN9_cI1_n_S-2i3esxLymEHqGbyQ3TTXoFZeKNn1z56_S1Ep-dozra03XqJ91AsPszqCI26nVG7h6sIBaysEcASrPqBJqBAcKGYZqAzpTNboRSjMlYxDWXAFEQBMSTSLquqlcVACAhlrVR4jOr5LDcnyDORCE2ccbvpBaVSiwxEC-z210pKYNkput7omM5LUkZqHYYTPHWCpwFLSdoSZ38deI7qy0VhLmzRX8JltaLfbGKwpQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Cyber+Threat+Intelligence+Sharing%3A+A+Survey&rft.jtitle=Journal+of+information+engineering+and+applications&rft.issn=2224-5782&rft_id=info:doi/10.7176%2Fjiea%2F15-2-08&rft.externalDocID=10.7176%2Fjiea%2F15-2-08 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2224-5782&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2224-5782&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2224-5782&client=summon |