Cybercrime threat intelligence: A systematic multi-vocal literature review

Giuseppe Cascavilla, Damian A. Tamburri, Willem-Jan Van Den Heuvel
2021 Computers & security  
Cybersecurity (LEAs) should cover these features with appropriate technologies to aid in the investigative processes; (iii) what (limited) degree of anonymity is possible when crawling in Deep-, Dark-Web-researchers should strive to fill this gap with more and more advanced degrees of anonymity to grant protection to LEAs during their investigations. c o m p u t e r s & s e c u r i t y 1 0 5 ( 2 0 2 1 ) 1 0 2 2 5 8 Fig. 1 -Threat intelligence lifecycle.
doi:10.1016/j.cose.2021.102258 fatcat:43fk6zb6k5fx5jtj5a24bu3afi