Title
Compare Before You Buy: Privacy-Preserving Selection of Threat Intelligence Providers
Abstract
In their pursuit to maximize their return on investment, cybercriminals will likely reuse as much as possible between their campaigns. Not only will the same phishing mail be sent to tens of thousands of targets, but reuse of the tools and infrastructure across attempts will lower their costs of doing business. This reuse, however, creates an effective angle for mitigation, as defenders can recogn...
Year
DOI
Venue
2021
10.1109/WIFS53200.2021.9648381
2021 IEEE International Workshop on Information Forensics and Security (WIFS)
Keywords
DocType
ISSN
private set union,mpsu-ca,indicator of compromise,threat intelligence
Conference
2157-4766
ISBN
Citations 
PageRank 
978-1-6654-1717-4
0
0.34
References 
Authors
0
3
Name
Order
Citations
PageRank
Jelle Vos100.34
Zekeriya Erkin257939.17
Christian Doerr300.34