{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:49:48Z","timestamp":1774367388899,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2016K1A1A2912757"],"award-info":[{"award-number":["NRF-2016K1A1A2912757"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,10,14]]},"DOI":"10.1145\/3132465.3132468","type":"proceedings-article","created":{"date-parts":[[2017,10,4]],"date-time":"2017-10-04T12:17:34Z","timestamp":1507119454000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Rethinking information sharing for threat intelligence"],"prefix":"10.1145","author":[{"given":"Aziz","family":"Mohaisen","sequence":"first","affiliation":[{"name":"University of Central Florida"}]},{"given":"Omar","family":"Al-Ibrahim","sequence":"additional","affiliation":[{"name":"University at Buffalo"}]},{"given":"Charles","family":"Kamhoua","sequence":"additional","affiliation":[{"name":"Army Research Laboratory"}]},{"given":"Kevin","family":"Kwiat","sequence":"additional","affiliation":[{"name":"Air force Research Lab"}]},{"given":"Laurent","family":"Njilla","sequence":"additional","affiliation":[{"name":"Air force Research Lab"}]}],"member":"320","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Cyber Information Sharing and Collaboration Program. http:\/\/www.dhs.gov\/topic\/cybersecurity-information-sharing. (May 2016).  -. 2016. Cyber Information Sharing and Collaboration Program. http:\/\/www.dhs.gov\/topic\/cybersecurity-information-sharing. (May 2016)."},{"key":"e_1_3_2_1_4_1","volume-title":"https:\/\/developers.facebook.com\/products\/threat-exchange\/. (May","author":"Facebook Inc. 2016. ThreatExchange.","year":"2016","unstructured":"Facebook Inc. 2016. ThreatExchange. https:\/\/developers.facebook.com\/products\/threat-exchange\/. (May 2016 ). Facebook Inc. 2016. ThreatExchange. https:\/\/developers.facebook.com\/products\/threat-exchange\/. (May 2016)."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/259380.259405"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.80"},{"key":"e_1_3_2_1_8_1","volume-title":"Kwiat","author":"Kamhoua Charles A.","year":"2015","unstructured":"Charles A. Kamhoua , Anbang Ruan , Andrew P. Martin , and Kevin A . Kwiat . 2015 . On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis. In 8th IEEE\/ACM UCC. 217--226. Charles A. Kamhoua, Anbang Ruan, Andrew P. Martin, and Kevin A. Kwiat. 2015. On the Feasibility of an Open-Implementation Cloud Infrastructure: A Game Theoretic Analysis. In 8th IEEE\/ACM UCC. 217--226."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2016.2572686"},{"key":"e_1_3_2_1_10_1","volume-title":"Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap. Information Security Magazine. (May","author":"Malik Javvad","year":"2016","unstructured":"Javvad Malik . 2016. Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap. Information Security Magazine. (May 2016 ). Javvad Malik. 2016. Threat Intelligence Sharing: The Only Way to Combat Our Growing Skills Gap. Information Security Magazine. (May 2016)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488056"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08509-8_7"},{"key":"e_1_3_2_1_13_1","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum Helen","unstructured":"Helen Nissenbaum . 2009. Privacy in context: Technology, policy, and the integrity of social life . Stanford University Press . Helen Nissenbaum. 2009. Privacy in context: Technology, policy, and the integrity of social life. Stanford University Press."},{"key":"e_1_3_2_1_14_1","volume-title":"malware to cost $491 billion","author":"Robinson Teri","year":"2014","unstructured":"Teri Robinson . 2014. Breaches , malware to cost $491 billion in 2014 , study says. http:\/\/bit.ly\/1gNXu90. (2014). Teri Robinson. 2014. Breaches, malware to cost $491 billion in 2014, study says. http:\/\/bit.ly\/1gNXu90. (2014)."},{"key":"e_1_3_2_1_15_1","volume-title":"Use of Information Sharing Between Government and Industry as a Weapon. Leading Issues in Information Warfare & Security Research 1","author":"Ryan Julie","year":"2012","unstructured":"Julie Ryan . 2012. Use of Information Sharing Between Government and Industry as a Weapon. Leading Issues in Information Warfare & Security Research 1 ( 2012 ). Julie Ryan. 2012. Use of Information Sharing Between Government and Industry as a Weapon. Leading Issues in Information Warfare & Security Research 1 (2012)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2015.7249499"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSCloud.2015.81"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.47"},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of DIMVA.","author":"Wang An","year":"2015","unstructured":"An Wang , Aziz Mohaisen , Wentao Chang , and Songqing Chen . 2015 . Revealing DDoS Attack Dynamics behind the Scenes . In Proc. of DIMVA. An Wang, Aziz Mohaisen, Wentao Chang, and Songqing Chen. 2015. Revealing DDoS Attack Dynamics behind the Scenes. In Proc. of DIMVA."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.213"}],"event":{"name":"SEC '17: IEEE\/ACM Symposium on Edge Computing","location":"San Jose California","acronym":"SEC '17","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","IEEE-CS\\DATC IEEE Computer Society"]},"container-title":["Proceedings of the fifth ACM\/IEEE Workshop on Hot Topics in Web Systems and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132465.3132468","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3132465.3132468","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:04:57Z","timestamp":1750273497000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3132465.3132468"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":17,"alternative-id":["10.1145\/3132465.3132468","10.1145\/3132465"],"URL":"https:\/\/doi.org\/10.1145\/3132465.3132468","relation":{},"subject":[],"published":{"date-parts":[[2017,10,14]]},"assertion":[{"value":"2017-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}