{"_id":"ubHGBTwXtyW3kcaQm","bibbaseid":"chadwick-fan-costantino-delemos-cerbo-herwono-manea-mori-etal-acloudedgebaseddatasecurityarchitectureforsharingandanalysingcyberthreatinformation-2020","authorIDs":[],"author_short":["Chadwick, D. W.","Fan, W.","Costantino, G.","de Lemos, R.","Cerbo, F. D.","Herwono, I.","Manea, M.","Mori, P.","Sajjad, A.","Wang, X."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["David","W."],"propositions":[],"lastnames":["Chadwick"],"suffixes":[]},{"firstnames":["Wenjun"],"propositions":[],"lastnames":["Fan"],"suffixes":[]},{"firstnames":["Gianpiero"],"propositions":[],"lastnames":["Costantino"],"suffixes":[]},{"firstnames":["Rogério"],"propositions":["de"],"lastnames":["Lemos"],"suffixes":[]},{"firstnames":["Francesco","Di"],"propositions":[],"lastnames":["Cerbo"],"suffixes":[]},{"firstnames":["Ian"],"propositions":[],"lastnames":["Herwono"],"suffixes":[]},{"firstnames":["Mirko"],"propositions":[],"lastnames":["Manea"],"suffixes":[]},{"firstnames":["Paolo"],"propositions":[],"lastnames":["Mori"],"suffixes":[]},{"firstnames":["Ali"],"propositions":[],"lastnames":["Sajjad"],"suffixes":[]},{"firstnames":["Xiao-Si"],"propositions":[],"lastnames":["Wang"],"suffixes":[]}],"title":"A cloud-edge based data security architecture for sharing and analysing cyber threat information","journal":"Future Gener. Comput. Syst.","volume":"102","pages":"710–722","year":"2020","url":"https://doi.org/10.1016/j.future.2019.06.026","doi":"10.1016/j.future.2019.06.026","timestamp":"Sat, 05 Sep 2020 01:00:00 +0200","biburl":"https://dblp.org/rec/journals/fgcs/ChadwickFCLCHMM20.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@article{DBLP:journals/fgcs/ChadwickFCLCHMM20,\n author = {David W. Chadwick and\n Wenjun Fan and\n Gianpiero Costantino and\n Rog{\\'{e}}rio de Lemos and\n Francesco Di Cerbo and\n Ian Herwono and\n Mirko Manea and\n Paolo Mori and\n Ali Sajjad and\n Xiao{-}Si Wang},\n title = {A cloud-edge based data security architecture for sharing and analysing\n cyber threat information},\n journal = {Future Gener. Comput. Syst.},\n volume = {102},\n pages = {710--722},\n year = {2020},\n url = {https://doi.org/10.1016/j.future.2019.06.026},\n doi = {10.1016/j.future.2019.06.026},\n timestamp = {Sat, 05 Sep 2020 01:00:00 +0200},\n biburl = {https://dblp.org/rec/journals/fgcs/ChadwickFCLCHMM20.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Chadwick, D. W.","Fan, W.","Costantino, G.","de Lemos, R.","Cerbo, F. D.","Herwono, I.","Manea, M.","Mori, P.","Sajjad, A.","Wang, X."],"key":"DBLP:journals/fgcs/ChadwickFCLCHMM20","id":"DBLP:journals/fgcs/ChadwickFCLCHMM20","bibbaseid":"chadwick-fan-costantino-delemos-cerbo-herwono-manea-mori-etal-acloudedgebaseddatasecurityarchitectureforsharingandanalysingcyberthreatinformation-2020","role":"author","urls":{"Paper":"https://doi.org/10.1016/j.future.2019.06.026"},"metadata":{"authorlinks":{}}},"bibtype":"article","biburl":"http://dltgroup.dmi.unipg.it/temp_files/global.bib","creationDate":"2021-01-14T18:29:36.197Z","downloads":0,"keywords":[],"search_terms":["cloud","edge","based","data","security","architecture","sharing","analysing","cyber","threat","information","chadwick","fan","costantino","de lemos","cerbo","herwono","manea","mori","sajjad","wang"],"title":"A cloud-edge based data security architecture for sharing and analysing cyber threat information","year":2020,"dataSources":["SjN5QvQnwzXZgxsKq"]}