[1]
A. Tajudeen and A. Nureni, “A Survey On Categorization Of Threat Intelligence And Trust-Based Sharing Strategies On Cyber Attack”, Vokasi Unesa Bull. Eng. Technol. Appl. Sci., vol. 2, no. 2, pp. 227–242, Jun. 2025.