{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T02:19:50Z","timestamp":1771467590652,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/ictas.2017.7920657","type":"proceedings-article","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T21:04:53Z","timestamp":1494623093000},"page":"1-6","source":"Crossref","is-referenced-by-count":20,"title":["Developing a cyber threat intelligence sharing platform for South African organisations"],"prefix":"10.1109","author":[{"given":"Muyowa","family":"Mutemwa","sequence":"first","affiliation":[]},{"given":"Jabu","family":"Mtsweni","sequence":"additional","affiliation":[]},{"given":"Njabulo","family":"Mkhonto","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"South african defense","year":"0","journal-title":"SouthAfricanGovernment"},{"key":"ref11","first-page":"42","article-title":"Growing Domestic Responsibility","author":"chuter","year":"2014","journal-title":"South African Defence Review"},{"key":"ref12","first-page":"89","article-title":"A comparison of international information security","volume":"9","author":"johnson","year":"2014","journal-title":"Inform Int Interdisciplinary J"},{"key":"ref13","article-title":"Cybercrimes and Cyberssecurity bill Darf for public Comment","year":"0","journal-title":"SouthAfricanGovernment"},{"key":"ref14","author":"ring","year":"0","journal-title":"Threat intelligence why people don't share"},{"key":"ref15","author":"mtsweni","year":"2016","journal-title":"Development of a Semantic-Enabled Cybersecurity Threat Intelligence Sharing Model"},{"key":"ref16","article-title":"Sap software download app","year":"0","journal-title":"InfoSecHotSpot"},{"key":"ref17","article-title":"Cyber Threat Intelligence","author":"lee","year":"0","journal-title":"Tripwire"},{"key":"ref18","year":"0","journal-title":"Cyber Threat & Reputation Intelligence"},{"key":"ref19","article-title":"Open threat xchange","year":"0","journal-title":"AlienVault"},{"key":"ref4","article-title":"National cybersecurity policy","year":"0","journal-title":"South African government"},{"key":"ref3","article-title":"A framework for cybersecurity information sharing and risk reduction","author":"goodwin","year":"0","journal-title":"Microsoft"},{"key":"ref6","author":"cimpanu","year":"0","journal-title":"Hacktivists have set their sights on Africa and the rampant corruption affecting its countries and above all its citizens"},{"key":"ref5","article-title":"2012 Norton Cybercrime Report","year":"0","journal-title":"NorthonSymantec"},{"key":"ref8","author":"writer","year":"0","journal-title":"Big increase in DDoS attacks"},{"key":"ref7","author":"cimpanu","year":"0","journal-title":"Members of the World Hacker Team one of Anonymous' subdivisions have breached South Africa's Department of Water Affairs (DWA) as part of the group's #OpAfrica and #OpMonsanto campaigns"},{"key":"ref2","author":"v d meulen","year":"0","journal-title":"Gartner Says 6 4 Billion Connected &#x201C;Things&#x201D; Will Be in Use in 2016 Up 30 Percent From 2015"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/jid.1716"},{"key":"ref9","article-title":"Global Cyber Trends a South African Reality","author":"grobler","year":"2012","journal-title":"1ST-Africa 2012 Conference Proceedings Dar es Salaam"},{"key":"ref20","first-page":"1","author":"richardson","year":"2008","journal-title":"CSI COMPUTER CRIME AND SECURITY SURVEY"},{"key":"ref21","year":"0","journal-title":"LiveThreatIntelligence Impact Report"}],"event":{"name":"2017 Conference on Information Communication Technology and Society (ICTAS)","location":"Durban, South Africa","start":{"date-parts":[[2017,3,8]]},"end":{"date-parts":[[2017,3,10]]}},"container-title":["2017 Conference on Information Communication Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7916887\/7920514\/07920657.pdf?arnumber=7920657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T03:04:21Z","timestamp":1506999861000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7920657\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/ictas.2017.7920657","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}