References
- 1Abbott, RG, McClain, J, Anderson, B, Nauer, K, Silva, A and Forsythe, C. 2015. Log analysis of cyber security training exercises. Procedia Manufacturing, 3: 5088–5094. DOI: 10.1016/j.promfg.2015.07.523
- 2Arzberger, P, Schroeder, P, Beaulieu, A, Bowker, GC, Casey, K, Laaksonen, L, Moorman, D, Uhlir, PF and Wouters, P. 2006. Promoting access to public research data for scientific, economic, and social development. Data Science Journal, 3: 135–152. DOI: 10.2481/dsj.3.135
- 3Atapour-Abarghouei, A, McGough, AS and Wall, DS. 2020. Resolving the cybersecurity data sharing paradox to scale up cybersecurity via a co-production approach towards data sharing. In: 2020 IEEE International Conference on Big Data (Big Data). pp. 3867–3876. DOI: 10.1109/BigData50022.2020.9378014
- 4Azhar, M, Bhatia, S, Gagne, G, Kari, C, Maguire, J, Mountrouidou, X, Tudor, L, Vosen, D and Yuen, TT. 2019. Securing the human: Broadening diversity in cybersecurity. In: Proceedings of the 2019 ACM Conference on Innovation and Technology in Computer Science Education. New York, NY, USA:
ACM . pp. 251–252. DOI: 10.1145/3304221.3325537 - 5Baker, K and Millerand, F. 2012.
Infrastructuring ecology: Challenges in achieving data sharing . In: Parker, J, Vermeulen, N and Penders, B (eds.), Collaboration in the New Life Sciences. Ashgate. pp. 111–138. - 6Balenson, D, Tinnel, L and Benzel, T. 2015.
Cybersecurity experimentation of the future (CEF): Catalyzing a new generation of experimental cybersecurity research . SRI International and USC Information Sciences Institute. Available athttps://cef.cyberexperimentation.org/application/files/2616/2160/7871/CEF_Final_Report_Bound_20150922.pdf - 7Balenson, D, Tinnel, LS and Kouper, I. 2020. Panel discussion and audience dialogue: Sharing artifacts and data for cybersecurity experimentation. Available at
https://www.usenix.org/conference/cset20/panel [Last accessed 11 August 2020]. - 8Bechhofer, S, De Roure, D, Gamble, M, Goble, C and Buchan, I. 2010. Research objects: Towards exchange and reuse of digital knowledge. Nature Precedings, (ERIM Project Document erim1rep091103ab12). DOI: 10.1038/npre.2010.4626
- 9Berman, F, Wilkinson, R and Wood, J. 2014. Building global infrastructure for data sharing and exchange through the research data alliance. D-Lib Magazine, 20(1/2): 1–4. DOI: 10.1045/january2014-berman
- 10Blackfire Technology, Inc. 2019. Impact CyberTrust. Available at
https://www.impactcybertrust.org/ [Last accessed 3 February 2022]. - 11Brown, C, Cowperthwaite, A, Hijazi, A and Somayaji, A. 2009. Analysis of the 1999 DARPA/Lincoln Laboratory IDS evaluation data with NetADHICT. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. pp. 1–7. DOI: 10.1109/CISDA.2009.5356522
- 12Brynielsson, J, Franke, U, Tariq, MA and Varga, S. 2016. Using cyber defense exercises to obtain additional data for attacker profiling. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI). pp. 37–42. DOI: 10.1109/ISI.2016.7745440
- 13Camp, LJ, Cranor, L, Feamster, N, Feigenbaum, J, Forrest, S, Kotz, D, Lee, W, Savage, S, Smith, S, Spafford, E and Stolfo, S. 2009. Data for cybersecurity research: Process and “Wish List.” Available at
https://www.researchgate.net/publication/255960171_Data_for_Cybersecurity_Research_Process_and_Wish_List . - 14Campbell, HA, Micheli-Campbell, MA and Udyawer, V. 2019. Early career researchers embrace data sharing. Trends in Ecology & Evolution, 34(2): 95–98. DOI: 10.1016/j.tree.2018.11.010
- 15Cavelty, MD. 2018. Cybersecurity research meets science and technology studies. Politics and Governance, 6(2): 22–30. DOI: 10.17645/pag.v6i2.1385
- 16Chawinga, WD and Zinn, S. 2019. Global perspectives of research data sharing: A systematic literature review. Library & Information Science Research, 41(2): 109–122. DOI: 10.1016/j.lisr.2019.04.004
- 17Choucri, N, Madnick, S and Koupke, P. 2018. Institutions for cybersecurity: International responses and data sharing initiatives. The MIT Press. DOI: 10.7551/mitpress/11636.003.0003
- 18Craigen, D, Diakun-Thibault, N and Purse, R. 2014. Defining cybersecurity. Technology Innovation Management Review, 4(10): 13–21. DOI: 10.22215/timreview/835
- 19Cybersecurity. 2009. Cybersecurity Glossary. Available at
https://niccs.cisa.gov/about-niccs/cybersecurity-glossary#C [Last accessed 22 July 2021]. - 20Douglass, K, Allard, S, Tenopir, C, Wu, L and Frame, M. 2013. Managing scientific data as public assets: Data sharing practices and policies among full-time government employees. Journal of the Association for Information Science and Technology, 65(2): 215–429. DOI: 10.1002/asi.22988
- 21Dumitraş, T. 2018. Worldwide Intelligence Network Environment (WINE). Available at
http://users.umiacs.umd.edu/~tdumitra/blog/old/worldwide-intelligence-network-environment/ [Last accessed 29 June 2022]. - 22Dumitraş, T and Shou, D. 2011. Toward a standard benchmark for computer security research: The worldwide intelligence network environment (WINE). In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security. New York, NY, USA:
Association for Computing Machinery . pp. 89–96. DOI: 10.1145/1978672.1978683 - 23Fisk, G, Ardi, C, Pickett, N, Heidemann, J, Fisk, M and Papadopoulos, C. 2015. Privacy principles for sharing cyber security data. In: 2015 IEEE Security and Privacy Workshops. pp. 193–197. DOI: 10.1109/SPW.2015.23
- 24Fontugne, R, Borgnat, P, Abry, P and Fukuda, K. 2010. MAWILab: Combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In: Proceedings of the 6th International Conference. New York, NY, USA:
ACM . DOI: 10.1145/1921168.1921179 - 25Gormley, CJ and Gormley, SJ. 2012. Data hoarding and information clutter: The impact on cost, life span of data, effectiveness, sharing, productivity, and knowledge management culture. Issues in Information Systems, 13(2): 90–95.
- 26Hrynaszkiewicz, I, Harney, J and Cadwallader, L. 2021. A survey of researchers’ needs and priorities for data sharing. Data Science Journal, 20(1):
31 . DOI: 10.5334/dsj-2021-031 - 27Hui, P, Bruce, J, Fink, G, Gregory, M, Best, D, McGrath, L and Endert, A. 2010. Towards efficient collaboration in cyber security. In: 2010 International Symposium on Collaborative Technologies and Systems.
IEEE Computer Society . pp. 489–498. DOI: 10.1109/CTS.2010.5478473 - 28Information Centre of Excellence for Tech Innovation (ISCX). 2007. Datasets. Available at
http://www.iscx.ca/datasets/ [Last accessed 3 February 2022]. - 29InfraGuard. 2018. Available at
https://www.infragard.org/ [Last accessed 3 February 2022]. - 30Ives, ZG, Green, TJ, Karvounarakis, G, Taylor, NE, Tannen, V, Talukdar, PP, Jacob, M and Pereira, F. 2008. The ORCHESTRA Collaborative Data Sharing System. ACM SIGMOD Record, 37(3): 26–32. DOI: 10.1145/1462571.1462577
- 31Kashef, R, Freunek, M, Schwartzentruber, J, Samavi, R, Bulgurcu, B, Khan, AJ and Santos, M. 2023. Bridging the bubbles: Connecting academia and industry in cybersecurity research. [Preprint]. DOI: 10.32920/24132645.v1
- 32Kemmerer, RA. 2003. Cybersecurity. In: Proceedings of the 25th International Conference on Software Engineering. pp. 705–715. DOI: 10.1109/ICSE.2003.1201257
- 33Larivière, V, Ni, C, Gingras, Y, Cronin, B and Sugimoto, CR. 2013. Bibliometrics: Global gender disparities in science. Nature, 504(7479): 211–213. DOI: 10.1038/504211a
- 34Li, Z and Oprea, A. 2016. Operational security log analytics for enterprise breach detection. In: 2016 IEEE Cybersecurity Development (SecDev). pp. 15–22. DOI: 10.1109/SecDev.2016.015
- 35Linger, R, Goldrich, L, Bishop, M and Dark, M. 2017. Agile research for cybersecurity: creating authoritative, actionable knowledge when speed matters. In: Proceedings of the 50th Hawaii International Conference on System Sciences. DOI: 10.24251/HICSS.2017.723
- 36Maciá-Fernández, G, Camacho, J, Magán-Carrión, R, García-Teodoro, P and Therón, R. 2018. UGR’16: A new dataset for the evaluation of cyclostationarity-based network IDSs. Computers and Security, 73: 411–424. DOI: 10.1016/j.cose.2017.11.004
- 37Mahoney, MV and Chan, PK. 2003.
An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection . In: Vigna Giovanni and Kruegel, C and Erland, J (eds.), Recent Advances in Intrusion Detection. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 220–237. DOI: 10.1007/978-3-540-45248-5_13 - 38Mathew, AJ and Cheshire, C. 2018. A fragmented whole: Cooperation and learning in the practice of information security. UC Berkeley and Packet Clearing House. Available at
https://www.pch.net/resources/Papers/A_Fragmented_Whole/ . - 39Maxson Jones, K, Ankeny, RA and Cook-Deegan, R. 2018. The Bermuda Triangle: The pragmatics, policies, and principles for data sharing in the history of the Human Genome Project. Journal of the History of Biology, 51(4): 693–805. DOI: 10.1007/s10739-018-9538-7
- 40McHugh, J. 2000. Testing intrusion detection systems: A critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory. ACM Transactions on Information and System Security, 3(4): 262–294. DOI: 10.1145/382912.382923
- 41MIT Lincoln Laboratory. 2016. Cyber Grand Challenge – Datasets. Available at
https://www.ll.mit.edu/r-d/datasets/cyber-grand-challenge-datasets [Last accessed 3 February 2022]. - 42Moore, T, Kenneally, E, Collett, M and Thapa, P. 2019. Valuing cybersecurity research datasets (SSRN Scholarly Paper No. ID 3469364). Available at
https://papers.ssrn.com/abstract=3469364 [Last accessed 22 July 2021]. - 43Moustafa, N and Slay, J. 2015. UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 Military Communications and Information Systems Conference (MilCIS). pp. 1–6. DOI: 10.1109/MilCIS.2015.7348942
- 44Munaiah, N, Pelletier, J, Su, S-H, Yang, S and Meneely, A. 2019. A cybersecurity dataset derived from the national collegiate penetration testing competition. In: 2019 Hawaii International Conference on System Sciences. Available at
https://www.rit.edu/academicaffairs/facultyscholarship/submit/download_file.php?id=128537 [Last accessed 6 June 2023]. - 45Nelson, B. 2009. Data sharing: Empty archives. Nature, 461(7261): 160–163. DOI: 10.1038/461160a
- 46Pala, A and Zhuang, J. 2019. Information sharing in cybersecurity: A review. Decision Analysis, 16(3): 172–196. DOI: 10.1287/deca.2018.0387
- 47Peacock, D and Irons, A. 2017. Gender inequality in cybersecurity: Exploring the gender gap in opportunities and progression. International Journal of Gender, Science and Technology, 9(1): 25–44.
- 48Plale, BA, Dickson, E, Kouper, I, Liyanage, S, Ma, Y, McDonald, RH, Walsh, JA and Withana, S. 2019. Safe open science for restricted data. Data and Information Management, 3(1): 50–60. DOI: 10.2478/dim-2019-0005
- 49Poirier, L and Costelloe-Kuehn, B. 2019. Data sharing at scale: A heuristic for affirming data cultures. Data Science Journal, 18(1):
48 . DOI: 10.5334/dsj-2019-048 - 50Poster, WR. 2018. Cybersecurity needs women. Nature, 555(7698): 577–580. DOI: 10.1038/d41586-018-03327-w
- 51Ross, MB, Glennon, BM, Murciano-Goroff, R, Berkes, EG, Weinberg, BA and Lane, JI. 2022. Women are credited less in science than men. Nature, 608(7921): 135–145. DOI: 10.1038/s41586-022-04966-w
- 52San Diego Supercomputer Center. 2020. Center for Applied Internet Data Analysis (CAIDA). CAIDA. Available at
https://www.caida.org/ [Last accessed 29 June 2022]. - 53Sarker, IH, Kayes, ASM, Badsha, S, Alqahtani, H, Watters, P and Ng, A. 2020. Cybersecurity data science: An overview from machine learning perspective. Journal of Big Data, 7(1):
41 . DOI: 10.1186/s40537-020-00318-5 - 54Sauerwein, C, Pekaric, I, Felderer, M and Breu, R. 2019. An analysis and classification of public information security data sources used in research and practice. Computers & Security, 82: 140–155. DOI: 10.1016/j.cose.2018.12.011
- 55Scheper, C, Cantor, S and Maughan, D. 2011. PREDICT: A trusted framework for sharing data for cyber security research. In: Proceedings of the First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security BADGERS ’11. pp. 105–106. DOI: 10.1145/1978672.1978686
- 56Sebastian, G. 2022. Could incorporating cybersecurity reporting into SOX have prevented most data breaches at U.S. publicly traded companies? An exploratory study. International Cybersecurity Law Review, 3(2): 367–383. DOI: 10.1365/s43439-022-00062-x
- 57Serrano, O, Dandurand, L and Brown, S. 2014. On the design of a cyber security data sharing system. In: Proceedings of the 2014 ACM Workshop on Information Sharing & Collaborative Security – WISCS ’14. pp. 61–69. DOI: 10.1145/2663876.2663882
- 58Shiravi, A, Shiravi, H, Tavallaee, M and Ghorbani, AA. 2012. Toward developing a systematic approach to generate benchmark datasets for intrusion detection. Computers & Security, 31(3): 357–374. DOI: 10.1016/j.cose.2011.12.012
- 59Shou, D. 2012.
Ethical considerations of sharing data for cybersecurity research . In: Danezis, G, Dietrich, S and Sako, K (eds.), Financial Cryptography and Data Security. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 169–177. DOI: 10.1007/978-3-642-29889-9_15 - 60Shumba, R, Ferguson-Boucher, K, Sweedyk, E, Taylor, C, Franklin, G, Turner, C, Sande, C, Acholonu, G, Bace, R and Hall, L. 2013. Cybersecurity, women, and minorities: Findings and recommendations from a preliminary investigation. In: Proceedings of the ITiCSE Working Group Reports Conference on Innovation and Technology in Computer Science Education-Working Group Reports. New York, NY, USA:
ACM . pp. 1–14. DOI: 10.1145/2543882.2543883 - 61Sommer, R and Paxson, V. 2010. Outside the closed world: On using machine learning for network intrusion detection. In: 2010 IEEE Symposium on Security and Privacy. pp. 305–316. DOI: 10.1109/SP.2010.25
- 62Sommestad, T and Hallberg, J. 2012.
Cyber security exercises and competitions as a platform for cyber security experiments . In: Jøsang, A and Carlsson, B (eds.), Secure IT Systems. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 47–60. DOI: 10.1007/978-3-642-34210-3_4 - 63Sperotto, A, Sadre, R, van Vliet, F and Pras, A. 2009.
A labeled data set for flow-based intrusion detection . In: Nunzi, G, Scoglio, C and Li, X (eds.), IP Operations and Management. Berlin, Heidelberg: Springer Berlin Heidelberg. pp. 39–50. DOI: 10.1007/978-3-642-04968-2_4 - 64Su, X, Johnson, J and Bozeman, B. 2015. Gender diversity strategy in academic departments: exploring organizational determinants. Higher Education, 69(5): 839–858. DOI: 10.1007/s10734-014-9808-z
- 65Sun, N, Zhang, J, Rimba, P, Gao, S, Zhang, LY and Xiang, Y. 2019. Data-driven cybersecurity incident prediction: A survey. IEEE Communications Surveys & Tutorials, 21(2): 1744–1772. DOI: 10.1109/COMST.2018.2885561
- 66Tavallaee, M, Bagheri, E, Lu, W and Ghorbani, AA. 2009. A detailed analysis of the KDD CUP 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications. pp. 1–6. DOI: 10.1109/CISDA.2009.5356528
- 67Tenopir, C, Allard, S, Douglass, K, Aydinoglu, A U, Wu, L, Read, E, Manoff, M and Frame, M. 2011. Data sharing by scientists: Practices and perceptions. PLoS ONE, 6(6). DOI: 10.1371/journal.pone.0021101
- 68Tuma, K and Van Der Lee, R. 2022.
The role of diversity in cybersecurity risk analysis: An experimental plan . In: Proceedings of the Third Workshop on Gender Equality, Diversity, and Inclusion in Software Engineering. New York, NY, USA: ACM. pp. 12–18. DOI: 10.1145/3524501.3527595 - 69University of California Irvine. 1999. KDD Cup 1999 Data. Available at
https://kdd.ics.uci.edu/databases/kddcup99/kddcup99.html [Last accessed 3 February 2022]. - 70US Department of Homeland Security. 2022. Cyber Information Sharing and Collaboration Program (CISCP). Available at
https://www.cisa.gov/ciscp [Last accessed 3 February 2022]. - 71Walton, S, Wheeler, PR, Zhang, Y (Ian) and Zhao, X (Ray). 2021. An integrative review and analysis of cybersecurity research: Current state and future directions. Journal of Information Systems, 35(1): 155–186. DOI: 10.2308/ISYS-19-033
- 72Yanakiev, Y. 2020. A governance model of a collaborative networked organization for cybersecurity research. Information & Security, 46(1): 79–98. DOI: 10.11610/isij.4606
- 73Zheng, M, Robbins, H, Chai, Z, Thapa, P and Moore, T. 2018. Cybersecurity research datasets: Taxonomy and empirical analysis. In: 11th USENIX Workshop on Cyber Security Experimentation and Test CSET-18. Available at
https://www.usenix.org/system/files/conference/cset18/cset18-paper-zheng.pdf [Last accessed 22 July 2021].
