Author of the publication

Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice.

, , , and . WISCS@CCS, page 65-70. ACM, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Quality Challenges and Future Research Directions in Threat Intelligence Sharing Practice., , , and . WISCS@CCS, page 65-70. ACM, (2016)Threat Intelligence Sharing Platforms: An Exploratory Study of Software Vendors and Research Perspectives., , , and . Wirtschaftsinformatik, (2017)Integrating Microservices from an Ongoing Research Project., and . SE, volume P-300 of LNI, page 163-168. Gesellschaft für Informatik e.V., (2020)The Tweet Advantage: An Empirical Analysis of 0-Day Vulnerability Information Shared on Twitter., , , , and . SEC, volume 529 of IFIP Advances in Information and Communication Technology, page 201-215. Springer, (2018)Mapping the State of Security Standards Mappings., , and . Wirtschaftsinformatik (Zentrale Tracks), page 1309-1324. GITO Verlag, (2020)Towards a Maturity Model for Inter-Organizational Cyber Threat Intelligence Sharing: A Case Study of Stakeholders' Expectations and Willingness to Share., , , and . MKWI, page 1409-1420. Leuphana University Lüneburg, (2018)Post-Merger IT Integration Success and Performance Measurement: A Systematic Literature Study., , , and . AMCIS, Association for Information Systems, (2018)Enabling change-driven workflows in continuous information security management., , and . SAC, page 1924-1933. ACM, (2019)