Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Conference Paper
%1 conf/icccn/DogTRCQHYA16
%A Dog, Spike E.
%A Tweed, Alex
%A Rouse, LeRoy
%A Chu, Bill
%A Qi, Duan
%A Hu, Yueqi
%A Yang, Jing
%A Al-Shaer, Ehab
%B ICCCN
%D 2016
%I IEEE
%K
%P 1-6
%T Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs.
%U http://dblp.uni-trier.de/db/conf/icccn/icccn2016.html#DogTRCQHYA16
%@ 978-1-5090-2279-3
@inproceedings{conf/icccn/DogTRCQHYA16,
added-at = {2023-12-13T01:58:48.000+0100},
author = {Dog, Spike E. and Tweed, Alex and Rouse, LeRoy and Chu, Bill and Qi, Duan and Hu, Yueqi and Yang, Jing and Al-Shaer, Ehab},
biburl = {https://www.bibsonomy.org/bibtex/27c6fdc5dd22d24602f42616f08899883/admin},
booktitle = {ICCCN},
crossref = {conf/icccn/2016},
ee = {http://dx.doi.org/10.1109/ICCCN.2016.7568578},
interhash = {792c1e356bea20a58069f05de5a92ca2},
intrahash = {7c6fdc5dd22d24602f42616f08899883},
isbn = {978-1-5090-2279-3},
keywords = {},
pages = {1-6},
publisher = {IEEE},
timestamp = {2023-12-13T01:58:48.000+0100},
title = {Strategic Cyber Threat Intelligence Sharing: A Case Study of IDS Logs.},
url = {http://dblp.uni-trier.de/db/conf/icccn/icccn2016.html#DogTRCQHYA16},
year = 2016
}