
Li, V. G., Dunn, M., Pearce, P., McCoy, D., Voelker, G. M.,
and Savage, S. (2019). Reading the tea leaves: A
comparative analysis of threat intelligence. In 28th
USENIX Security Symposium (USENIX Security 19),
pages 851–867.
Ludl, C., McAllister, S., Kirda, E., and Kruegel, C. (2007).
On the effectiveness of techniques to detect phishing
sites. In International Conference on Detection of In-
trusions and Malware, and Vulnerability Assessment,
pages 20–39. Springer.
Makey, J. Blacklists compared. https://www.sdsc.edu/
∼
jef
f/spam/Blacklists Compared.html. Accessed: 2022-
05-05, not available anymore.
Meier, R., Scherrer, C., Gugelmann, D., Lenders, V., and
Vanbever, L. (2018). Feedrank: A tamper-resistant
method for the ranking of cyber threat intelligence
feeds. In 2018 10th International Conference on Cy-
ber Conflict (CyCon), pages 321–344.
Metcalf, L. and Spring, J. M. (2013). Everything you
wanted to know about blacklists but were afraid to
ask. Software Engineering Institute, CERT Coordi-
nation Center, Pittsburgh, PA, Tech. Rep. CERTCC-
2013-39.
Metcalf, L. and Spring, J. M. (2015). Blacklist ecosystem
analysis: Spanning jan 2012 to jun 2014. In Proceed-
ings of the 2nd ACM Workshop on Information Shar-
ing and Collaborative Security, pages 13–22.
Oest, A., Safaei, Y., Doup
´
e, A., Ahn, G.-J., Wardman, B.,
and Tyers, K. (2019). Phishfarm: A scalable frame-
work for measuring the effectiveness of evasion tech-
niques against browser phishing blacklists. In 2019
IEEE Symposium on Security and Privacy (SP), pages
1344–1361. IEEE.
Pawlinski, P., Jaroszewski, P., Kijewski, P., Siewierski, L.,
Jacewicz, P., Zielony, P., and Zuber, R. (2014). Ac-
tionable information for security incident response.
Technical report, ENISA.
Pawli
´
nski, P., Kijewski, P., and Kompanek, A. D. (2016).
Towards a methodology for evaluating threat intelli-
gence feeds. FIRST.
Pinto, A. and Maxwell, K. tiq-test - threat intelligence
quotient test. https://github.com/mlsecproject/tiq-test.
Accessed: 2022-05-05.
Pinto, A. and Maxwell, K. (2014). Measuring the IQ of
your threat intelligence feeds. Defcon-22.
Pinto, A. and Sieira, A. (2015). Data-driven threat intel-
ligence: Useful methods and measurements for han-
dling indicators. FIRST.
Pitsillidis, A., Kanich, C., Voelker, G. M., Levchenko, K.,
and Savage, S. (2012). Taster’s choice: a comparative
analysis of spam feeds. In Proceedings of the 2012
Internet Measurement Conference, pages 427–440.
Qiang, L., Zhengwei, J., Zeming, Y., Baoxu, L., Xin,
W., and Yunan, Z. (2018). A quality evaluation
method of cyber threat intelligence in user perspec-
tive. In 2018 17th IEEE International Confer-
ence On Trust, Security And Privacy In Computing
And Communications/12th IEEE International Con-
ference On Big Data Science And Engineering (Trust-
Com/BigDataSE), pages 269–276. IEEE.
Ramachandran, A., Dagon, D., and Feamster, N. (2006).
Can dns-based blacklists keep up with bots? In CEAS.
Ramachandran, A. and Feamster, N. (2006). Understanding
the network-level behavior of spammers. In Proceed-
ings of the 2006 conference on Applications, technolo-
gies, architectures, and protocols for computer com-
munications, SIGCOMM ’06, pages 291–302. Asso-
ciation for Computing Machinery.
Ramanathan, S., Mirkovic, J., and Yu, M. (2020). Blag:
Improving the accuracy of blacklists. In NDSS.
RSA, The Security Division of EMC (2012). Getting ahead
of advanced threats: Achieving intelligence-driven
information security, recommendations from global
1000 executives. Security for Business Innovation
Council.
Sauerwein, C., Pekaric, I., Felderer, M., and Breu, R.
(2019). An analysis and classification of public in-
formation security data sources used in research and
practice. Computers & security, 82:140–155.
Sauerwein, C., Sillaber, C., Mussmann, A., and Breu, R.
(2017). Threat intelligence sharing platforms: An
exploratory study of software vendors and research
perspectives. Proceedings der 13. Internationalen
Tagung Wirtschaftsinformatik (WI 2017), pages 837–
851.
Schlette, D., B
¨
ohm, F., Caselli, M., and Pernul, G. (2021).
Measuring and visualizing cyber threat intelligence
quality. International Journal of Information Security,
20(1):21–38.
Sheng, S., Wardman, B., Warner, G., Cranor, L., Hong, J.,
and Zhang, C. (2009). An empirical analysis of phish-
ing blacklists. In CEAS 2009 - Sixth Conference on
Email and Anti-Spam.
Sinha, S., Bailey, M., and Jahanian, F. (2008). Shades of
grey: On the effectiveness of reputation-based “black-
lists”. In 2008 3rd International Conference on Ma-
licious and Unwanted Software (MALWARE), pages
57–64. IEEE.
Zhang, Y., Egelman, S., Cranor, L., and Hong, J. (2007).
Phinding phish: Evaluating anti-phishing tools. In
Proceedings of The 14th Annual Network and Dis-
tributed System Security Symposium (NDSS ’07).
ICISSP 2024 - 10th International Conference on Information Systems Security and Privacy
66