Guest Editor(s)
-
- Prof. Jill Slay
- Department of Science, Technology, Engineering and Mathematics, University of South Australia, Adelaide, SA, Australia.
Website | E-mail
-
- Assoc. Prof. Dave Ormrod
- Enterprise Fellow in Cyber Security, University of South Australia, Adelaide, SA, Australia.
Website | E-mail
Special Issue Introduction
For millennia, thinking like the enemy and understanding your own capabilities and vulnerabilities have been fundamental aspects of warfare. The digital age has not changed these fundamentals, although it has transformed the mechanisms and technologies employed to gain an advantage in both conflict and competition. Cyber Threat Intelligence (CTI) transforms data and information collected from the operating environment into an understanding of adversary or competitor capability, intent, and opportunity. This understanding is a critical enabler to cyber operations, offering knowledge of tactics, techniques and procedures, tradecraft, and attribution that can enable both defensive and offensive operations.
This Special Issue on CTI plans to address the challenges of contemporary cyber operations from a multi- and trans-disciplinary perspective. CTI is enabled by a diverse range of solutions, making it a proving ground for various avenues of study and differing world views. From research agendas focused on areas such as machine learning algorithms and data collection techniques, through to a broader study of system of systems, psychology, or sociology, our understanding of CTI and the approaches to improve it can benefit from many disciplines. Original research, tools, techniques, technologies, and designs for extending state of the art are sought, with a view of bringing together the experts in the field to offer a contemporary view of CTI as it is used today, and the technology and research which will define the future.
Submission Deadline
25 Oct 2022