Measuring and visualizing cyber threat intelligence quality

The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that ina...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:International journal of information security Ročník 20; číslo 1; s. 21 - 38
Hlavní autori: Schlette, Daniel, Böhm, Fabian, Caselli, Marco, Pernul, Günther
Médium: Journal Article
Jazyk:English
Vydavateľské údaje: Berlin/Heidelberg Springer Berlin Heidelberg 01.02.2021
Springer Nature B.V
Predmet:
ISSN:1615-5262, 1615-5270
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that inaccurate, incomplete, or outdated threat intelligence is a major problem as only high-quality CTI can be helpful to detect and defend against cyber attacks. Additionally, while the amount of available CTI is increasing it is not warranted that quality remains unaffected. In conjunction with the increasing number of available CTI, it is thus in the best interest of every stakeholder to be aware of the quality of a CTI artifact. This allows for informed decisions and permits detailed analyses. Our work makes a twofold contribution to the challenge of assessing threat intelligence quality. We first propose a series of relevant quality dimensions and configure metrics to assess the respective dimensions in the context of CTI. In a second step, we showcase the extension of an existing CTI analysis tool to make the quality assessment transparent to security analysts. Furthermore, analysts’ subjective perceptions are, where necessary, included in the quality assessment concept.
AbstractList The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative generation of CTI by the means of sharing platforms has proven to be an important aspect of practical application. It is evident to infer that inaccurate, incomplete, or outdated threat intelligence is a major problem as only high-quality CTI can be helpful to detect and defend against cyber attacks. Additionally, while the amount of available CTI is increasing it is not warranted that quality remains unaffected. In conjunction with the increasing number of available CTI, it is thus in the best interest of every stakeholder to be aware of the quality of a CTI artifact. This allows for informed decisions and permits detailed analyses. Our work makes a twofold contribution to the challenge of assessing threat intelligence quality. We first propose a series of relevant quality dimensions and configure metrics to assess the respective dimensions in the context of CTI. In a second step, we showcase the extension of an existing CTI analysis tool to make the quality assessment transparent to security analysts. Furthermore, analysts’ subjective perceptions are, where necessary, included in the quality assessment concept.
Author Böhm, Fabian
Caselli, Marco
Pernul, Günther
Schlette, Daniel
Author_xml – sequence: 1
  givenname: Daniel
  orcidid: 0000-0002-4847-522X
  surname: Schlette
  fullname: Schlette, Daniel
  organization: University of Regensburg
– sequence: 2
  givenname: Fabian
  orcidid: 0000-0002-0023-6051
  surname: Böhm
  fullname: Böhm, Fabian
  email: Fabian.Boehm@ur.de
  organization: University of Regensburg
– sequence: 3
  givenname: Marco
  surname: Caselli
  fullname: Caselli, Marco
  organization: Siemens AG
– sequence: 4
  givenname: Günther
  surname: Pernul
  fullname: Pernul, Günther
  organization: University of Regensburg
BookMark eNp9kE9LxDAQxYOs4O7qF_BU8FydpGnS4kkW_8GKFz2HNE3WLDXdTVKhfnpbKwoe9vJmBt5vZngLNHOt0widY7jEAPwqYCDA00FSAFpC2h-hOWY4T3PCYfbbM3KCFiFsAQiGEs_R9ZOWofPWbRLp6uTDhk429nOcVV9pn8Q3r2VMrIu6aexGO6WT_eiJ_Sk6NrIJ-uynLtHr3e3L6iFdP98_rm7WqaLAYlpXylSmhEyVuqAFNazCWNYVraEsjalILblSUuZFVipT6JobApgzqggfnCRbootp7863-06HKLZt591wUhDKC8ZYXtDBVUwu5dsQvDZC2SijbV300jYCgxijElNUYhDxHZXoB5T8Q3fevkvfH4ayCQq7MT7t_746QH0BaZd_ZA
CitedBy_id crossref_primary_10_1007_s10207_024_00869_1
crossref_primary_10_3390_electronics14091826
crossref_primary_10_1016_j_jisa_2024_103786
crossref_primary_10_32604_cmc_2022_025310
crossref_primary_10_1007_s10207_025_01080_6
crossref_primary_10_1007_s10207_020_00528_1
crossref_primary_10_3390_s21144890
crossref_primary_10_1016_j_cose_2024_104079
crossref_primary_10_1016_j_cosrev_2025_100765
crossref_primary_10_3390_electronics10232913
crossref_primary_10_1007_s10207_025_01033_z
crossref_primary_10_1109_COMST_2021_3117338
crossref_primary_10_3390_electronics13214329
crossref_primary_10_1080_0960085X_2022_2088414
crossref_primary_10_1365_s43439_024_00117_1
crossref_primary_10_1016_j_cose_2021_102482
crossref_primary_10_1155_2023_3303122
crossref_primary_10_3390_electronics14163251
crossref_primary_10_1109_COMST_2023_3273282
crossref_primary_10_3390_electronics12143185
crossref_primary_10_3390_app15084327
crossref_primary_10_1109_ACCESS_2024_3351108
crossref_primary_10_3390_app122211631
crossref_primary_10_3390_app14166872
crossref_primary_10_1016_j_cose_2024_103972
crossref_primary_10_1016_j_ijinfomgt_2025_102902
crossref_primary_10_1109_ACCESS_2025_3550378
crossref_primary_10_1145_3484202
crossref_primary_10_1145_3530809
crossref_primary_10_1007_s10207_025_01006_2
crossref_primary_10_3390_app12031205
crossref_primary_10_1109_ACCESS_2025_3606477
Cites_doi 10.1145/3319535.3354239
10.1145/2994539.2994546
10.1016/j.cose.2017.09.001
10.1016/j.cose.2017.10.009
10.1007/978-3-319-24106-7
10.1145/1541880.1541883
10.1145/3029806.3029811
10.1016/j.inffus.2017.12.006
10.1145/505248.506010
10.1016/S1361-3723(14)70469-5
10.1109/69.404034
10.1007/s10207-019-00433-2
10.1186/s42400-018-0017-4
10.1080/07421222.1996.11518099
10.1109/FiCloud.2015.82
10.1016/j.dss.2005.05.019
10.1145/240455.240479
10.1016/j.cose.2016.04.003
10.1145/2663876.2663882
ContentType Journal Article
Copyright The Author(s) 2020
The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: The Author(s) 2020
– notice: The Author(s) 2020. This work is published under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID C6C
AAYXX
CITATION
0-V
3V.
7SC
7WY
7WZ
7XB
87Z
88F
8AL
8AM
8AO
8FD
8FE
8FG
8FK
8FL
ABUWG
AFKRA
ALSLI
ARAPS
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
CCPQU
DWQXO
FRNLG
F~G
GNUQQ
HCIFZ
JQ2
K60
K6~
K7-
K7.
L.-
L7M
L~C
L~D
M0C
M0N
M0O
M1Q
P5Z
P62
PHGZM
PHGZT
PKEHL
PQBIZ
PQBZA
PQEST
PQGLB
PQQKQ
PQUKI
PRINS
PRQQA
Q9U
DOI 10.1007/s10207-020-00490-y
DatabaseName Springer Nature OA Free Journals
CrossRef
ProQuest Social Sciences Premium Collection【Remote access available】
ProQuest Central (Corporate)
Computer and Information Systems Abstracts
ABI/INFORM Collection
ABI/INFORM Global (PDF only)
ProQuest Central (purchase pre-March 2016)
ABI/INFORM Collection
Military Database (Alumni Edition)
Computing Database (Alumni Edition)
Criminal Justice Database (Alumni Edition)
ProQuest Pharma Collection
Technology Research Database
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni) (purchase pre-March 2016)
ABI/INFORM Collection (Alumni Edition)
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Social Science Premium Collection
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
ProQuest Business Premium Collection
Technology Collection
Criminology Collection
ProQuest One Community College
ProQuest Central
Business Premium Collection (Alumni)
ABI/INFORM Global (Corporate)
ProQuest Central Student
SciTech Premium Collection
ProQuest Computer Science Collection
ProQuest Business Collection (Alumni Edition)
ProQuest Business Collection
Computer Science Database
ProQuest Criminal Justice (Alumni)
ABI/INFORM Professional Advanced
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
ABI/INFORM Global
Computing Database
Criminal Justice Database
Military Database
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic (New)
ProQuest One Academic Middle East (New)
ProQuest One Business
ProQuest One Business (Alumni)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic (retired)
ProQuest One Academic UKI Edition
ProQuest Central China
ProQuest One Social Sciences
ProQuest Central Basic
DatabaseTitle CrossRef
ProQuest Business Collection (Alumni Edition)
Computer Science Database
ProQuest Central Student
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
SciTech Premium Collection
ProQuest Military Collection
ProQuest Central China
ABI/INFORM Complete
ProQuest One Applied & Life Sciences
ProQuest Central (New)
Advanced Technologies & Aerospace Collection
Business Premium Collection
Social Science Premium Collection
ABI/INFORM Global
ProQuest One Academic Eastern Edition
ProQuest Technology Collection
ProQuest Business Collection
Criminology Collection
Criminal Justice Periodicals (Alumni Edition)
ProQuest Social Sciences Premium Collection
ProQuest One Academic UKI Edition
ProQuest One Academic
ProQuest One Academic (New)
ABI/INFORM Global (Corporate)
ProQuest One Business
Technology Collection
Technology Research Database
Computer and Information Systems Abstracts – Academic
ProQuest One Academic Middle East (New)
ProQuest Central (Alumni Edition)
ProQuest One Community College
ProQuest Pharma Collection
ProQuest Central
ABI/INFORM Professional Advanced
ProQuest Criminal Justice
ProQuest Central Korea
Advanced Technologies Database with Aerospace
ABI/INFORM Complete (Alumni Edition)
ProQuest Computing
ProQuest One Social Sciences
ABI/INFORM Global (Alumni Edition)
ProQuest Central Basic
ProQuest Computing (Alumni Edition)
ProQuest Military Collection (Alumni Edition)
ProQuest SciTech Collection
Computer and Information Systems Abstracts Professional
Advanced Technologies & Aerospace Database
ProQuest Criminal Justice (Alumni)
ProQuest One Business (Alumni)
ProQuest Central (Alumni)
Business Premium Collection (Alumni)
DatabaseTitleList ProQuest Business Collection (Alumni Edition)
CrossRef

Database_xml – sequence: 1
  dbid: BENPR
  name: ProQuest Central
  url: https://www.proquest.com/central
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1615-5270
EndPage 38
ExternalDocumentID 10_1007_s10207_020_00490_y
GrantInformation_xml – fundername: Horizon 2020
  grantid: 830927
  funderid: http://dx.doi.org/10.13039/501100007601
GroupedDBID -59
-5G
-BR
-EM
-Y2
-~C
.4S
.86
.DC
.VR
0-V
06D
0R~
0VY
1N0
1SB
203
29J
2J2
2JN
2JY
2KG
2LR
2P1
2VQ
2~H
30V
3V.
4.4
406
408
409
40D
40E
5GY
5VS
67Z
6KP
6NX
7WY
8AO
8FE
8FG
8FL
8FW
8TC
8VB
95-
95.
95~
96X
AAAVM
AABHQ
AACDK
AAHNG
AAIAL
AAJBT
AAJKR
AANZL
AARHV
AARTL
AASML
AATNV
AATVU
AAUYE
AAWCG
AAYIU
AAYQN
AAYTO
AAYZH
ABAKF
ABBBX
ABBXA
ABDBF
ABDZT
ABECU
ABFTD
ABFTV
ABHQN
ABJNI
ABJOX
ABKCH
ABKTR
ABMNI
ABMQK
ABNWP
ABQBU
ABQSL
ABSXP
ABTEG
ABTHY
ABTKH
ABTMW
ABULA
ABUWG
ABWNU
ABXPI
ACAOD
ACBXY
ACDTI
ACGFS
ACHSB
ACHXU
ACKNC
ACMDZ
ACMLO
ACOKC
ACOMO
ACPIV
ACSNA
ACUHS
ACZOJ
ADHHG
ADHIR
ADINQ
ADKNI
ADKPE
ADMLS
ADRFC
ADTPH
ADURQ
ADYFF
ADZKW
AEBTG
AEFQL
AEGNC
AEJHL
AEJRE
AEKMD
AEMOZ
AEMSY
AENEX
AEOHA
AEPYU
AESKC
AETLH
AEVLU
AEXYK
AFBBN
AFGCZ
AFKRA
AFLOW
AFQWF
AFWTZ
AFZKB
AGAYW
AGDGC
AGJBK
AGMZJ
AGQEE
AGQMX
AGRTI
AGWIL
AGWZB
AGYKE
AHAVH
AHBYD
AHKAY
AHQJS
AHSBF
AHYZX
AIAKS
AIGIU
AIIXL
AILAN
AITGF
AJBLW
AJRNO
AJZVZ
AKVCP
ALMA_UNASSIGNED_HOLDINGS
ALSLI
ALWAN
AMKLP
AMXSW
AMYLF
AMYQR
AOCGG
ARALO
ARAPS
ARCSS
ARMRJ
ASPBG
AVWKF
AXYYD
AYJHY
AZFZN
AZQEC
B-.
B0M
BA0
BDATZ
BENPR
BEZIV
BGLVJ
BGNMA
BGRYB
BPHCQ
BSONS
C6C
CAG
CCPQU
COF
CS3
CSCUP
DDRTE
DL5
DNIVK
DPUIP
DU5
DWQXO
EAD
EAP
EBA
EBLON
EBR
EBS
EBU
ECS
EDO
EIOEI
EIS
EJD
EMK
EPL
ESBYG
EST
ESX
FEDTE
FERAY
FFXSO
FIGPU
FIL
FINBP
FNLPD
FRNLG
FRRFC
FSGXE
FWDCC
GGCAI
GGRSB
GJIRD
GNUQQ
GNWQR
GQ6
GQ7
GQ8
GROUPED_ABI_INFORM_COMPLETE
GXS
H13
HCIFZ
HF~
HG5
HG6
HLICF
HMJXF
HQYDN
HRMNR
HVGLF
HZ~
I-F
I09
IHE
IJ-
IKXTQ
ITM
IWAJR
IXC
IXE
IZIGR
IZQ
I~X
I~Z
J-C
J0Z
JBSCW
JCJTX
JZLTJ
K1G
K60
K6V
K6~
K7-
KDC
KOV
LAS
LLZTM
M0C
M0N
M0O
M1Q
M4Y
MA-
N2Q
NB0
NPVJJ
NQJWS
NU0
O9-
O93
O9J
P2P
P62
P9O
PF0
PQBIZ
PQBZA
PQQKQ
PROAC
PT4
Q2X
QOS
QWB
R89
R9I
RNS
ROL
RPX
RSV
S16
S1Z
S27
S3B
SAP
SCO
SDH
SHX
SISQX
SJYHP
SNE
SNPRN
SNX
SOHCF
SOJ
SPISZ
SRMVM
SSLCW
STPWE
SZN
T13
TH9
TN5
TSG
TSK
TSV
TUC
TUS
U2A
UG4
UOJIU
UTJUX
UZXMN
VC2
VFIZW
W23
W48
WK8
YLTOR
Z45
Z5O
Z7R
Z7X
Z81
Z83
Z88
ZL0
ZMTXR
~8M
~A9
AAPKM
AAYXX
ABBRH
ABDBE
ABFSG
ABRTQ
ACSTC
ADHKG
AEZWR
AFDZB
AFFHD
AFHIU
AFOHR
AGQPQ
AHPBZ
AHWEU
AIXLP
ATHPR
AYFIA
CITATION
PHGZM
PHGZT
PQGLB
PRQQA
7SC
7XB
8AL
8FD
8FK
JQ2
K7.
L.-
L7M
L~C
L~D
PKEHL
PQEST
PQUKI
PRINS
Q9U
ID FETCH-LOGICAL-c406t-dbcfbf903c9e8484f6b11adb4d099ffb2da7ccaa5839cf8ed7f201764c27b1123
IEDL.DBID RSV
ISICitedReferencesCount 47
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000517716000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 1615-5262
IngestDate Thu Nov 20 04:31:54 EST 2025
Sat Nov 29 02:59:45 EST 2025
Tue Nov 18 21:56:36 EST 2025
Fri Feb 21 02:37:21 EST 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Keywords Data quality
Threat intelligence formats
Cyber threat intelligence
Threat intelligence sharing
Information security visualization
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c406t-dbcfbf903c9e8484f6b11adb4d099ffb2da7ccaa5839cf8ed7f201764c27b1123
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-4847-522X
0000-0002-0023-6051
OpenAccessLink https://link.springer.com/10.1007/s10207-020-00490-y
PQID 2478666584
PQPubID 43999
PageCount 18
ParticipantIDs proquest_journals_2478666584
crossref_citationtrail_10_1007_s10207_020_00490_y
crossref_primary_10_1007_s10207_020_00490_y
springer_journals_10_1007_s10207_020_00490_y
PublicationCentury 2000
PublicationDate 2021-02-01
PublicationDateYYYYMMDD 2021-02-01
PublicationDate_xml – month: 02
  year: 2021
  text: 2021-02-01
  day: 01
PublicationDecade 2020
PublicationPlace Berlin/Heidelberg
PublicationPlace_xml – name: Berlin/Heidelberg
– name: Heidelberg
PublicationTitle International journal of information security
PublicationTitleAbbrev Int. J. Inf. Secur
PublicationYear 2021
Publisher Springer Berlin Heidelberg
Springer Nature B.V
Publisher_xml – name: Springer Berlin Heidelberg
– name: Springer Nature B.V
References Batini, C., Palmonari, M., Viscusi, G.: The many faces of information and their impact on information quality. In: Proceedings of the 17th International Conference in Information Quality (ICIQ 2012), pp. 212–228. MIT, Cambridge (2012)
WangRYStoreyVCFirthCPA framework for analysis of data quality researchIEEE Trans. Knowl. Data Eng.19957462310.1109/69.404034
LazarJFengJHHochheiserHResearch Methods in Human–Computer Interaction2010BurlingtonMorgan Kaufmann
Dandurand, L., Serrano, O.S.: Towards improved cyber security information sharing. In: 2013 5th International Conference on Cyber Conflict (CYCON 2013). IEEE Computer Society Press, Los Alamitos (2013)
Sauerwein, C., Sillaber, C., Mussmann, A., Breu, R.: Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings of the 13th International Conference on Wirtschaftsinformatik, pp. 837–851. Springer, Heidelberg (2017)
Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 2: Stix objects (2017). https://docs.oasis-open.org/cti/ stix/v2.0/stix-v2.0-part2-stix-objects.html
RiescoRVillagráVALeveraging cyber threat intelligence fora dynamic risk frameworkInt. J. Inf. Secur.20191871573910.1007/s10207-019-00433-2
JøsangAIsmailRBoydCA survey of trust and reputation systems for online service provisionDecis. Support Syst.200743261810.1016/j.dss.2005.05.019
Serrano, O., Dandurand, L., Brown, S.: On the design of a cyber security data sharing system. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security - WISCS ’14, pp. 61–69. ACM, New York (2014)
Kokulu, F.B. Soneji, A. Bao, T., Shoshitaishvili, Y., Zhao, Z., Doupé, A., Ahn G.J.: Matched and mismatched socs: a qualitative study on security operations center issues. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery, New York, NY, USA, 2019), CCS ’19, pp. 1955–1970. https://doi.org/10.1145/3319535.3354239
WandYWangRYAnchoring data quality dimensions in ontological foundationsCommun. ACM199639118610.1145/240455.240479
PipinoLLLeeYWWangRYData quality assessmentCommun. ACM200245421110.1145/505248.506010
MengesFPernulGA comparative analysis of incident reporting formatsComput. Secur.2018738710110.1016/j.cose.2017.10.009
Gascon, H., Grobauer, B., Schreck, T., Rist, L., Arp, D., Rieck, K.: Mining attributed graphs for threat intelligence. In: Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy, pp. 15–22. ACM, New York (2017)
Böhm, F., Menges, F., Pernul, G.: Graph-based visual analytics for cyber threat intelligence. Cybersecurity (Cybersecurity) 1, 1 (2018)
Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 1: Stix core concepts (2017). https://docs.oasis-open.org/ cti/stix/v2.0/stix-v2.0-part1-stix-core.html
Ponemon Institute LLC.: Live threat intelligence impact report 2013 (2013). https://www.ponemon.org/blog/ live-threat-intelligence-impact-report-2013-1
BatiniCScannapiecoMData and Information Quality: Dimensions, Principles and Techniques2016ChamSpringer10.1007/978-3-319-24106-7
Heinrich, B. Kaiser, M. Klier, M.: How to measure data quality? A metric-based approach. In: ICIS 2007 Proceedings pp. 108–122 (2007)
RingTThreat intelligence: Why people don’t shareComput. Fraud Secur.201420143510.1016/S1361-3723(14)70469-5
Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security - WISCS’16, pp. 65–70. ACM, New York (2016)
SkopikFSettanniGFiedlerRA problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharingComputers & Security20166015417610.1016/j.cose.2016.04.003
SängerJRichthammerCPernulGReusable components for online reputation systemsJ. Trust Manag.2015251
JuranJMGrynaFMJuran’s Quality Control Handbook19884New YorkMcGraw-Hill
RedmanTCData Quality for the Information Age1996NorwoodArtech House Publishers
Symantec Corporation.: Internet security threat report 2019 (2019). https://www.symantec.com/content/dam/ symantec/docs/reports/istr-24-2019-en.pdf
Umbrich, J., Neumaier, S., Polleres, A.: Quality assessment and evolution of open data portals. In: 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud), pp. 404–411. IEEE Computer Society Press, Los Alamitos (2015)
Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Towards a maturity model for inter-organizational cyber threat intelligence sharing: A case study of stakeholder’s expectations and willingness to share. In: Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018), pp. 6–9. Springer, Heidelberg (2018)
BatiniCCappielloCFrancalanciCMaurinoAMethodologies for data quality assessment and improvementACM Comput. Surv.2009413110.1145/1541880.1541883
ChaturvediICambriaEWelschREHerreraFDistinguishing between facts and opinions for sentiment analysis: survey and challengesInf. Fus.2018446510.1016/j.inffus.2017.12.006
WangRYStrongDMBeyond accuracy: What data quality means to data consumersJ. Manag. Inf. Syst.1996124510.1080/07421222.1996.11518099
TounsiWRaisHA survey on technical threat intelligence in the age of sophisticated cyber attacksComput. Secur.20187221223310.1016/j.cose.2017.09.001
490_CR11
490_CR10
T Ring (490_CR4) 2014; 2014
490_CR31
490_CR30
490_CR15
J Lazar (490_CR32) 2010
F Menges (490_CR14) 2018; 73
490_CR13
490_CR12
Y Wand (490_CR19) 1996; 39
J Sänger (490_CR26) 2015; 2
RY Wang (490_CR20) 1996; 12
LL Pipino (490_CR24) 2002; 45
R Riesco (490_CR2) 2019; 18
490_CR22
C Batini (490_CR16) 2009; 41
F Skopik (490_CR17) 2016; 60
490_CR25
W Tounsi (490_CR7) 2018; 72
490_CR3
RY Wang (490_CR23) 1995; 7
490_CR29
490_CR5
490_CR6
490_CR27
C Batini (490_CR18) 2016
I Chaturvedi (490_CR28) 2018; 44
490_CR1
TC Redman (490_CR21) 1996
JM Juran (490_CR8) 1988
A Jøsang (490_CR9) 2007; 43
References_xml – reference: RiescoRVillagráVALeveraging cyber threat intelligence fora dynamic risk frameworkInt. J. Inf. Secur.20191871573910.1007/s10207-019-00433-2
– reference: Dandurand, L., Serrano, O.S.: Towards improved cyber security information sharing. In: 2013 5th International Conference on Cyber Conflict (CYCON 2013). IEEE Computer Society Press, Los Alamitos (2013)
– reference: RingTThreat intelligence: Why people don’t shareComput. Fraud Secur.201420143510.1016/S1361-3723(14)70469-5
– reference: SängerJRichthammerCPernulGReusable components for online reputation systemsJ. Trust Manag.2015251
– reference: Heinrich, B. Kaiser, M. Klier, M.: How to measure data quality? A metric-based approach. In: ICIS 2007 Proceedings pp. 108–122 (2007)
– reference: PipinoLLLeeYWWangRYData quality assessmentCommun. ACM200245421110.1145/505248.506010
– reference: Sauerwein, C., Sillaber, C., Mussmann, A., Breu, R.: Threat intelligence sharing platforms: an exploratory study of software vendors and research perspectives. In: Proceedings of the 13th International Conference on Wirtschaftsinformatik, pp. 837–851. Springer, Heidelberg (2017)
– reference: Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Towards a maturity model for inter-organizational cyber threat intelligence sharing: A case study of stakeholder’s expectations and willingness to share. In: Proceedings of Multikonferenz Wirtschaftsinformatik (MKWI 2018), pp. 6–9. Springer, Heidelberg (2018)
– reference: Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 2: Stix objects (2017). https://docs.oasis-open.org/cti/ stix/v2.0/stix-v2.0-part2-stix-objects.html
– reference: RedmanTCData Quality for the Information Age1996NorwoodArtech House Publishers
– reference: Batini, C., Palmonari, M., Viscusi, G.: The many faces of information and their impact on information quality. In: Proceedings of the 17th International Conference in Information Quality (ICIQ 2012), pp. 212–228. MIT, Cambridge (2012)
– reference: LazarJFengJHHochheiserHResearch Methods in Human–Computer Interaction2010BurlingtonMorgan Kaufmann
– reference: WangRYStrongDMBeyond accuracy: What data quality means to data consumersJ. Manag. Inf. Syst.1996124510.1080/07421222.1996.11518099
– reference: ChaturvediICambriaEWelschREHerreraFDistinguishing between facts and opinions for sentiment analysis: survey and challengesInf. Fus.2018446510.1016/j.inffus.2017.12.006
– reference: BatiniCCappielloCFrancalanciCMaurinoAMethodologies for data quality assessment and improvementACM Comput. Surv.2009413110.1145/1541880.1541883
– reference: Sillaber, C., Sauerwein, C., Mussmann, A., Breu, R.: Data quality challenges and future research directions in threat intelligence sharing practice. In: Proceedings of the 2016 ACM on Workshop on Information Sharing and Collaborative Security - WISCS’16, pp. 65–70. ACM, New York (2016)
– reference: Böhm, F., Menges, F., Pernul, G.: Graph-based visual analytics for cyber threat intelligence. Cybersecurity (Cybersecurity) 1, 1 (2018)
– reference: Ponemon Institute LLC.: Live threat intelligence impact report 2013 (2013). https://www.ponemon.org/blog/ live-threat-intelligence-impact-report-2013-1
– reference: WandYWangRYAnchoring data quality dimensions in ontological foundationsCommun. ACM199639118610.1145/240455.240479
– reference: Gascon, H., Grobauer, B., Schreck, T., Rist, L., Arp, D., Rieck, K.: Mining attributed graphs for threat intelligence. In: Proceedings of the 7th ACM on Conference on Data and Application Security and Privacy, pp. 15–22. ACM, New York (2017)
– reference: SkopikFSettanniGFiedlerRA problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharingComputers & Security20166015417610.1016/j.cose.2016.04.003
– reference: Piazza, R., Wunder, J., Jordan, B.: StixTM version 2.0. part 1: Stix core concepts (2017). https://docs.oasis-open.org/ cti/stix/v2.0/stix-v2.0-part1-stix-core.html
– reference: BatiniCScannapiecoMData and Information Quality: Dimensions, Principles and Techniques2016ChamSpringer10.1007/978-3-319-24106-7
– reference: MengesFPernulGA comparative analysis of incident reporting formatsComput. Secur.2018738710110.1016/j.cose.2017.10.009
– reference: TounsiWRaisHA survey on technical threat intelligence in the age of sophisticated cyber attacksComput. Secur.20187221223310.1016/j.cose.2017.09.001
– reference: Kokulu, F.B. Soneji, A. Bao, T., Shoshitaishvili, Y., Zhao, Z., Doupé, A., Ahn G.J.: Matched and mismatched socs: a qualitative study on security operations center issues. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (Association for Computing Machinery, New York, NY, USA, 2019), CCS ’19, pp. 1955–1970. https://doi.org/10.1145/3319535.3354239
– reference: Umbrich, J., Neumaier, S., Polleres, A.: Quality assessment and evolution of open data portals. In: 2015 3rd International Conference on Future Internet of Things and Cloud (FiCloud), pp. 404–411. IEEE Computer Society Press, Los Alamitos (2015)
– reference: Serrano, O., Dandurand, L., Brown, S.: On the design of a cyber security data sharing system. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security - WISCS ’14, pp. 61–69. ACM, New York (2014)
– reference: WangRYStoreyVCFirthCPA framework for analysis of data quality researchIEEE Trans. Knowl. Data Eng.19957462310.1109/69.404034
– reference: JuranJMGrynaFMJuran’s Quality Control Handbook19884New YorkMcGraw-Hill
– reference: JøsangAIsmailRBoydCA survey of trust and reputation systems for online service provisionDecis. Support Syst.200743261810.1016/j.dss.2005.05.019
– reference: Symantec Corporation.: Internet security threat report 2019 (2019). https://www.symantec.com/content/dam/ symantec/docs/reports/istr-24-2019-en.pdf
– ident: 490_CR12
  doi: 10.1145/3319535.3354239
– ident: 490_CR25
– ident: 490_CR6
– ident: 490_CR5
  doi: 10.1145/2994539.2994546
– volume: 72
  start-page: 212
  year: 2018
  ident: 490_CR7
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2017.09.001
– volume: 73
  start-page: 87
  year: 2018
  ident: 490_CR14
  publication-title: Comput. Secur.
  doi: 10.1016/j.cose.2017.10.009
– volume-title: Data and Information Quality: Dimensions, Principles and Techniques
  year: 2016
  ident: 490_CR18
  doi: 10.1007/978-3-319-24106-7
– volume-title: Data Quality for the Information Age
  year: 1996
  ident: 490_CR21
– volume: 41
  start-page: 1
  issue: 3
  year: 2009
  ident: 490_CR16
  publication-title: ACM Comput. Surv.
  doi: 10.1145/1541880.1541883
– ident: 490_CR31
– ident: 490_CR10
– ident: 490_CR3
– ident: 490_CR27
  doi: 10.1145/3029806.3029811
– volume: 44
  start-page: 65
  year: 2018
  ident: 490_CR28
  publication-title: Inf. Fus.
  doi: 10.1016/j.inffus.2017.12.006
– ident: 490_CR1
– volume: 2
  start-page: 1
  issue: 5
  year: 2015
  ident: 490_CR26
  publication-title: J. Trust Manag.
– volume: 45
  start-page: 211
  issue: 4
  year: 2002
  ident: 490_CR24
  publication-title: Commun. ACM
  doi: 10.1145/505248.506010
– volume: 2014
  start-page: 5
  issue: 3
  year: 2014
  ident: 490_CR4
  publication-title: Comput. Fraud Secur.
  doi: 10.1016/S1361-3723(14)70469-5
– volume: 7
  start-page: 623
  issue: 4
  year: 1995
  ident: 490_CR23
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/69.404034
– volume: 18
  start-page: 715
  year: 2019
  ident: 490_CR2
  publication-title: Int. J. Inf. Secur.
  doi: 10.1007/s10207-019-00433-2
– ident: 490_CR29
  doi: 10.1186/s42400-018-0017-4
– volume-title: Juran’s Quality Control Handbook
  year: 1988
  ident: 490_CR8
– ident: 490_CR15
– volume: 12
  start-page: 5
  issue: 4
  year: 1996
  ident: 490_CR20
  publication-title: J. Manag. Inf. Syst.
  doi: 10.1080/07421222.1996.11518099
– ident: 490_CR22
  doi: 10.1109/FiCloud.2015.82
– volume: 43
  start-page: 618
  issue: 2
  year: 2007
  ident: 490_CR9
  publication-title: Decis. Support Syst.
  doi: 10.1016/j.dss.2005.05.019
– volume-title: Research Methods in Human–Computer Interaction
  year: 2010
  ident: 490_CR32
– volume: 39
  start-page: 86
  issue: 11
  year: 1996
  ident: 490_CR19
  publication-title: Commun. ACM
  doi: 10.1145/240455.240479
– volume: 60
  start-page: 154
  year: 2016
  ident: 490_CR17
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2016.04.003
– ident: 490_CR11
  doi: 10.1145/2663876.2663882
– ident: 490_CR30
– ident: 490_CR13
SSID ssj0021091
Score 2.4790418
Snippet The very raison d’être of cyber threat intelligence (CTI) is to provide meaningful knowledge about cyber security threats. The exchange and collaborative...
SourceID proquest
crossref
springer
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 21
SubjectTerms Best interests
Coding and Information Theory
Collaboration
Communications Engineering
Computer Communication Networks
Computer Science
Cryptology
Cybersecurity
Decision analysis
Evaluation
Information gathering
Intelligence
Intelligence gathering
Internet
Management of Computing and Information Systems
Networks
Operating Systems
Quality assessment
Quality control
Regular Contribution
Security
Subject specialists
Subjectivity
Threat evaluation
Threats
SummonAdditionalLinks – databaseName: Computer Science Database
  dbid: K7-
  link: http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwpV3NS8MwFH_o9ODF-YnTKT140-CaZk2LBxFRBHF4UNitNGmDA-nmWgf1r_e9Ll1VcBcvhdLXEPKSvN_7Bjj1SQalJmTCj2MmODcsSBNFwVSoMns8DISqmk3IwSAYDsMna3DLbVhlfSdWF3Uy1mQjv-BCBgi1UV5eTd4ZdY0i76ptobEKay7nLu3zB8kWChcVvSSFC6U2Klw-t0kzNnWOk5GOU161CHus_CmYGrT5y0FayZ279n9nvAWbFnE61_Mtsg0rabYD7bqbg2MP9y5cPlbmQpyEE2eJMxvllG_5Se-6VEhZvBLAdEbfing685zMcg9e7m6fb-6Zba3ANErwgiVKG2XCnqfDNBCBML5y3ThRIkHEaIziSSyRt3Ef8ZM2yD1pEClIX2gukZJ7-9DKxll6AI4WIeqACOt6WougHyg3NVq42hOSnDqyA269rpG2dcep_cVb1FRMJl5E-IgqXkRlB84W_0zmVTeWUndrBkT2BOZRs_odOK9Z2Hz-e7TD5aMdwQansJYqcLsLrWL6kR7Dup4Vo3x6Uu2_L3lu32c
  priority: 102
  providerName: ProQuest
Title Measuring and visualizing cyber threat intelligence quality
URI https://link.springer.com/article/10.1007/s10207-020-00490-y
https://www.proquest.com/docview/2478666584
Volume 20
WOSCitedRecordID wos000517716000001&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAVX
  databaseName: SpringerLINK Contemporary 1997-Present
  customDbUrl:
  eissn: 1615-5270
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0021091
  issn: 1615-5262
  databaseCode: RSV
  dateStart: 20010801
  isFulltext: true
  titleUrlDefault: https://link.springer.com/search?facet-content-type=%22Journal%22
  providerName: Springer Nature
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV3dS8MwED9088EX5ydO5-iDb1pos6xJ8UnHhiCbc35NX0qTNjiQKmsd1L_eS9duU1TQl4PQayh3Se93yX0AHDraBoXKNanj-yYlRJk8DIQOpkKXuUFcTkXWbIL1enw4dPt5UlhcRLsXV5LZn3oh2Y3oYzWiM6Gpa5npMpTR3HG9HQfXdzM3S5e61G4W2mp0sxySp8p8P8dnczTHmF-uRTNr06n87zvXYS1Hl8bpdDlswFIYbUKl6Nxg5Bt5C0662dEgTmv4UWBMRrHOrXzXY5kK5EyeNJg0RgsFO41p_mW6Dbed9k3r3MzbKJgSrXViBkIqoVyrId2QU06VI2zbDwQNEB0qJUjgM9Sj30SsJBVqiilEBcyhkjDkJI0dKEUvUbgLhqQu-nsI4SwpKW9yYYdKUls2KNMXOKwKdiFNT-Y1xnWri2dvXh1ZS8dD4mXS8dIqHM3eeZ1W2PiVu1Yoyct3W-wRyji6YYilqnBcKGX--OfZ9v7Gvg-rRIe0ZEHbNSgl47fwAFbkJBnF4zoss_uHOpTP2r3-AEcXzETatVoZvdTUvkLabz7WsxX7AUEp3Vc
linkProvider Springer Nature
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V1LS8NAEB5KFfRifWK1ag560mCz3eaBiEi1tPSBhwq9xewmiwVJa1sr8Uf5G51Jk1YFe-vBSyBks2QyszPf7M4D4NQkGxQoR-em5-mcMaXbgS8omApd5hJzbC7iZhNWu213u85DBj7TXBgKq0x1Yqyo_b6kPfJLxi0boTbay5vBq05do-h0NW2hMRWLRhC9o8s2uq7fIX_PGKvedyo1PekqoEs0XmPdF1IJ5RRL0glsbnNlCsPwfMF9BEtKCeZ7FpLllRE6SIUfbik0kpbJJbNwJBU6QJW_wjkuBwoVLFZmDh4V2SQHD1ECOngmS5J0klQ9RpuCjPK4uVPUo5-GcI5ufx3Ixnaumvtvf2gTNhJErd1Ol8AWZIJwG3JptwotUV47cNWKt0ORaM0LfW3SG1E-6Qfdy0jgyPEzAWit961IqTbNOY124XEpJOxBNuyHwT5okjvo4yJsLUrJ7bItjEBJbsgSt-jQysqDkfLRlUlddWrv8eLOK0IT7128uDHv3SgP57N3BtOqIgtHF1KGu4mGGblzbufhIhWZ-eO_ZztYPNsJrNU6rabbrLcbh7DOKIQnDlIvQHY8fAuOYFVOxr3R8DiWfQ2eli1KXzNkP5Q
linkToPdf http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMw1V3NS8MwFH8MFfHi_MTp1B70pGVrljUtIiLO4ZiOHRSGl9qkDQ5km9uc1D_Nv873unZTwd128FIoTQNJXt77_ZL3AXBkkw0KtWty2_dNzpg2nTCQ5EyFlLnEXIfLuNiEaDScVsttZuAzjYUht8pUJ8aKOugqOiMvMC4chNpoLws6cYtoVqoXvVeTKkjRTWtaTmMsIvUwekf6NjivVXCtjxmrXt9f3ZhJhQFToSEbmoFUWmq3WFJu6HCHa1talh9IHiBw0lqywBc4RL-MMEJpHITQaDCFzRUT2JKSHqD6XxTIMYn4NcuPE7JHCTeJ7CFiQLJnsyRgJwnbY3RAyCimm7tFM_ppFKdI99flbGzzqtn_PFtrsJogbeNyvDXWIRN2NiCbVrEwEqW2CWd38TEpToDhdwJj1B5QnOkHvatIYsvhMwFro_0teakxjkWNtuBhLkPYhoVOtxPugKG4i9wX4WxRKe6UHWmFWnFLlbigyyyRAytdU08l-dap7MeLN80UTXLg4cOL5cCLcnAy-ac3zjYys3U-XXwv0TwDb7ryOThNxWf6-e_edmf3dgjLKEHeba1R34MVRp49se96HhaG_bdwH5bUaNge9A_ibWDA07wl6QsJS0il
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Measuring+and+visualizing+cyber+threat+intelligence+quality&rft.jtitle=International+journal+of+information+security&rft.au=Schlette%2C+Daniel&rft.au=B%C3%B6hm%2C+Fabian&rft.au=Caselli%2C+Marco&rft.au=Pernul%2C+G%C3%BCnther&rft.date=2021-02-01&rft.pub=Springer+Berlin+Heidelberg&rft.issn=1615-5262&rft.eissn=1615-5270&rft.volume=20&rft.issue=1&rft.spage=21&rft.epage=38&rft_id=info:doi/10.1007%2Fs10207-020-00490-y&rft.externalDocID=10_1007_s10207_020_00490_y
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1615-5262&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1615-5262&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1615-5262&client=summon