Table of Contents
1Scope
2References
3Definitions
4Abbreviationsandacronyms
5Conventions
6Basicconcept-Cybersecurityinformation
exchange(CYBEX)
7Structuredcybersecurityinformationexchange
techniques
AppendixI-Structuredcybersecurityinformation
exchangetechniques
AppendixII-Acybersecurityinformationexchangeontology
AppendixIII-CYBEXexamplesofsecurityautomationschemas
Bibliography Abstract
Specifies techniques for exchanging cybersecurity information.