Techniques for threat intelligence collection, sharing, and reporting - initial version

Summary
D3.2 will present the techniques for threat intelligence information gathering, sharing and reporting corresponding to T3.2.