{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T06:48:24Z","timestamp":1774162104021,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030791995","type":"print"},{"value":"9783030792008","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-79200-8_50","type":"book-chapter","created":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:04:06Z","timestamp":1624471446000},"page":"343-350","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Overview of Cyber Threat Intelligence Description"],"prefix":"10.1007","author":[{"given":"Liang","family":"Guo","sequence":"first","affiliation":[]},{"given":"Senhao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Dewei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Shanbiao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Qianxun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Hualin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,24]]},"reference":[{"key":"50_CR1","unstructured":"Li, W.J., Jin, Q.Q., Guo, L.: Research on security situation awareness and intrusion intention recognition based on threat intelligence sharing. Jisuanji Yu Xiandaihua 01(03), 65\u201370 (2017)"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Liska, A.: Building an intelligence-led security program, p. 24 (2016)","DOI":"10.1007\/978-1-4842-2412-0"},{"issue":"07","key":"50_CR3","first-page":"560","volume":"5","author":"ZX Shi","year":"2019","unstructured":"Shi, Z.X., Ma, Y.R., Zhang, Y., et al.: Overview of threat intelligence standards. J. Inf. Secur. 5(07), 560\u2013569 (2019)","journal-title":"J. Inf. Secur."},{"key":"50_CR4","doi-asserted-by":"crossref","unstructured":"Liu, Z.Y., Li, Q.Y., Gong, Y.: Information sharing model of network security threat based on large-scale private network. Comput. Eng. Appl. 32, 18\u201320 (2018)","DOI":"10.1016\/S1353-4858(18)30026-6"},{"key":"50_CR5","unstructured":"Johnson, C., Badger, M., Waltermire, D.: Guide to cyber threat information sharing. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-150\/final"},{"key":"50_CR6","doi-asserted-by":"crossref","unstructured":"Brown, S., Gommers, J., Serrano, O.: From cyber security information sharing to threat management. In: Proceedings of the 2nd ACM Work-shop on WISCS 2015, pp. 43\u201349. ACM, New York (2015)","DOI":"10.1145\/2808128.2808133"},{"key":"50_CR7","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1007\/978-3-030-01177-2_49","volume-title":"Intelligent Computing. SAI 2018","author":"N Gong","year":"2018","unstructured":"Gong, N.: Barriers to adopting interoperability standards for cyber threat intelligence sharing: an exploratory study. In: Arai, K., Kapoor, S., Bhatia, R. (eds.) Intelligent Computing. SAI 2018. Advances in Intelligent Systems and Computing, vol. 857, pp. 667\u2013668. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-01177-2_49"},{"key":"50_CR8","unstructured":"OASIS CTI TC. Cyber Observable eXpression (CybOX\u2122) Archive, pp. 563\u2013566. https:\/\/cyboxproject.github.io\/"},{"key":"50_CR9","doi-asserted-by":"crossref","unstructured":"Burger, E.W., Goodman, M.D., Kampanakis, P., et al.: Taxonomy model for cyber threat intelligence information exchange technologies. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security, pp. 51\u201360. ACM (2014)","DOI":"10.1145\/2663876.2663883"},{"issue":"06","key":"50_CR10","first-page":"762","volume":"19","author":"H Li","year":"2018","unstructured":"Li, H., Du, Z.Y., Zhang, L.: Analysis and application of the network security threat information standard. J. Inf. Eng. Univ. 19(06), 762\u2013768 (2018)","journal-title":"J. Inf. Eng. Univ."},{"key":"50_CR11","unstructured":"Information security technology\u2014Cyber security threat information format. GB\/T 36643-2018 (2018)"},{"issue":"01","key":"50_CR12","first-page":"171","volume":"51","author":"JF Chen","year":"2018","unstructured":"Chen, J.F., Fan, H.B.: Ontological threat intelligence sharing in cyberspace security. Commun. Technol. 51(01), 171\u2013177 (2018)","journal-title":"Commun. Technol."},{"key":"50_CR13","unstructured":"The Mitre Corp. STIX-structured threat information expression. https:\/\/stix.mitre.org\/.765-768"},{"key":"50_CR14","unstructured":"Cyber Observable eXpression. http:\/\/cybox.mitre.org\/language\/version2.0\/"},{"issue":"01","key":"50_CR15","first-page":"31","volume":"1","author":"ZM Yang","year":"2015","unstructured":"Yang, Z.M., Li, Q., Liu, J.R.: Research of threat intelligence sharing and using for cyber attack attribution. J. Inf. Secur. Res. 1(01), 31\u201336 (2015)","journal-title":"J. Inf. Secur. Res."},{"issue":"1","key":"50_CR16","first-page":"136","volume":"46","author":"PA Yang","year":"2020","unstructured":"Yang, P.A., Liu, B.X., Du, X.Y.: Portrait analysis of threat intelligence for attack recognition. Comput. Eng. 46(1), 136\u2013143 (2020)","journal-title":"Comput. Eng."},{"issue":"1","key":"50_CR17","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1186\/s42400-019-0040-0","volume":"2","author":"M Vielberth","year":"2019","unstructured":"Vielberth, M.: Human-as-a-security-sensor for harvesting threat intelligence. Cybersecurity 2(1), 23 (2019)","journal-title":"Cybersecurity"},{"key":"50_CR18","unstructured":"Huang, W.: Application of semantic web technology in network threat intelligence analysis system. North China University of Technology (2017)"},{"issue":"6","key":"50_CR19","doi-asserted-by":"publisher","first-page":"872","DOI":"10.1631\/FITEE.1800520","volume":"20","author":"Y Qin","year":"2019","unstructured":"Qin, Y., Shen, G.W., Zhao, W.B., et al.: A network security entity recognition method based on feature template and CNN-BiLSTM-CRF. Front. Inf. Technol. Electron. Eng. 20(6), 872\u2013884 (2019)","journal-title":"Front. Inf. Technol. Electron. Eng."},{"key":"50_CR20","unstructured":"Wang, T.: Research and implementation of threat intelligence knowledge map technology. Electronic Science Research Institute of China Electronic Technology Group Corporation (2019)"}],"container-title":["Advances in Intelligent Systems and Computing","2021 International Conference on Applications and Techniques in Cyber Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-79200-8_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,23]],"date-time":"2021-06-23T18:31:21Z","timestamp":1624473081000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-79200-8_50"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030791995","9783030792008"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-79200-8_50","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"24 June 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ATCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Applications and Techniques in Cyber Security and Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fuyang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"atci2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/atci2021.fynu.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}