{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:45:37Z","timestamp":1767649537134,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030026066"},{"type":"electronic","value":"9783030026073"}],"license":[{"start":{"date-parts":[[2018,10,17]],"date-time":"2018-10-17T00:00:00Z","timestamp":1539734400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-02607-3_43","type":"book-chapter","created":{"date-parts":[[2018,10,16]],"date-time":"2018-10-16T08:53:30Z","timestamp":1539680010000},"page":"469-477","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Cyber Incident Classification: Issues and Challenges"],"prefix":"10.1007","author":[{"given":"Marina Danchovsky","family":"Ibrishimova","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,17]]},"reference":[{"unstructured":"Internet Security Threat Report (2018). https:\/\/www.symantec.com\/content\/dam\/symantec\/docs\/reports\/istr-23-2018-en.pdf. Accessed 19 Aug 2018","key":"43_CR1"},{"unstructured":"ITU-T X.1056 Recommendations (2018). http:\/\/handle.itu.int\/11.1002\/1000\/9615. Accessed 02 June 2018","key":"43_CR2"},{"doi-asserted-by":"publisher","unstructured":"Howard, J.D., Longstaff, T.A.: A common language for computer security incidents. United States. Web. (2018). https:\/\/doi.org\/10.2172\/751004","key":"43_CR3","DOI":"10.2172\/751004"},{"issue":"1","key":"43_CR4","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/S0167-4048(97)85785-9","volume":"16","author":"F Cohen","year":"1997","unstructured":"Cohen, F.: Information system attacks: a preliminary classification scheme. Comput. Secur. 16(1), 29\u201346 (1997)","journal-title":"Comput. Secur."},{"issue":"1","key":"43_CR5","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/COMST.2008.4483667","volume":"10","author":"Vinay Igure","year":"2008","unstructured":"Igure, V.M., Williams, R.D.: Taxonomies of attacks and vulnerabilities in computer systems. IEEE Commun. Surv. Tutor. 10(1), 6\u201319 (2008). https:\/\/doi.org\/10.1109\/comst.2008.4483667","journal-title":"IEEE Communications Surveys & Tutorials"},{"doi-asserted-by":"publisher","unstructured":"Sadeghian, A., Zamani, M., Abdullah, S.M.: A taxonomy of SQL injection attacks. 2013 International Conference on Informatics and Creative Multimedia, Kuala Lumpur, 2013, pp. 269\u2013273. (2013) https:\/\/doi.org\/10.1109\/icicm.2013.53","key":"43_CR6","DOI":"10.1109\/icicm.2013.53"},{"doi-asserted-by":"publisher","unstructured":"Lai, J., Wu, J., Chen, S., Wu, C., Yang, C.: Designing a taxonomy of web attacks. In: 2008 International Conference on Convergence and Hybrid Information Technology, Daejeon, 2008, pp. 278\u2013282. (2008) https:\/\/doi.org\/10.1109\/ichit.2008.280","key":"43_CR7","DOI":"10.1109\/ichit.2008.280"},{"doi-asserted-by":"publisher","unstructured":"Meddeb, R., Triki, B., Jemili, F., Korbaa, O.: A survey of attacks in mobile ad hoc networks. In: 2017 International Conference on Engineering & MIS (ICEMIS), Monastir, 2017, pp. 1\u20137. (2017). https:\/\/doi.org\/10.1109\/icemis.2017.8273007","key":"43_CR8","DOI":"10.1109\/icemis.2017.8273007"},{"doi-asserted-by":"publisher","unstructured":"Miloslavskaya, N., Tolstoy, A., Zapechnikov, S.: Taxonomy for unsecure big data processing in security operations centers. In: 2016 IEEE 4th International Conference on Future Internet of Things and Cloud Workshops (FiCloudW), Vienna, 2016, pp. 154\u2013159 (2016). https:\/\/doi.org\/10.1109\/w-ficloud.2016.42","key":"43_CR9","DOI":"10.1109\/w-ficloud.2016.42"},{"doi-asserted-by":"publisher","unstructured":"Miloslavskaya, N., Tolstoy, A., Zapechnikov, S.: Taxonomy for unsecure digital information processing. In: 2016 Third International Conference on Digital Information Processing, Data Mining, and Wireless Communications (DIPDMWC), Moscow, 2016, pp. 81\u201386 (2016). https:\/\/doi.org\/10.1109\/dipdmwc.2016.7529368","key":"43_CR10","DOI":"10.1109\/dipdmwc.2016.7529368"},{"doi-asserted-by":"publisher","unstructured":"Drias, Z., Serhrouchni, A., Vogel, O.: Taxonomy of attacks on industrial control protocols. In: 2015 International Conference on Protocol Engineering (ICPE) and International Conference on New Technologies of Distributed Systems (NTDS), Paris, 2015, pp. 1\u20136 (2015). https:\/\/doi.org\/10.1109\/notere.2015.7293513","key":"43_CR11","DOI":"10.1109\/notere.2015.7293513"},{"doi-asserted-by":"publisher","unstructured":"Johnson, C.W.: Tools and techniques for reporting and analysing the causes of cyber-security incidents in safety-critical systems. In: 9th IET International Conference on System Safety and Cyber Security (2014), Manchester, United Kingdom, 2014, pp. 1\u20137 (2014). https:\/\/doi.org\/10.1049\/cp.2014.0975","key":"43_CR12","DOI":"10.1049\/cp.2014.0975"},{"doi-asserted-by":"publisher","unstructured":"Hunt, R., Slay, J.: A new approach to developing attack taxonomies for network security - including case studies. In: 2011 17th IEEE International Conference on Networks, Singapore, 2011, pp. 281\u2013286 (2011). https:\/\/doi.org\/10.1109\/icon.2011.6168489","key":"43_CR13","DOI":"10.1109\/icon.2011.6168489"},{"doi-asserted-by":"publisher","unstructured":"Joyce, A.L., Evans, N., Tanzman, E.A., Israeli, D.: International cyber incident repository system: information sharing on a global scale. In: 2016 International Conference on Cyber Conflict (CyCon U.S.), Washington, DC, 2016, pp. 1\u20136 (2016). https:\/\/doi.org\/10.1109\/cyconus.2016.7836618","key":"43_CR14","DOI":"10.1109\/cyconus.2016.7836618"},{"doi-asserted-by":"publisher","unstructured":"Onwubiko, C.: Cyber security operations centre: security monitoring for protecting business and supporting cyber defense strategy. In: 2015 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), London, 2015, pp. 1\u201310 (2015). https:\/\/doi.org\/10.1109\/cybersa.2015.7166125","key":"43_CR15","DOI":"10.1109\/cybersa.2015.7166125"},{"doi-asserted-by":"publisher","unstructured":"Kowtha, S., Nolan, L.A., Daley, R.A.: Cyber security operations center characterization model and analysis. In: 2012 IEEE Conference on Technologies for Homeland Security (HST), Waltham, MA, 2012, pp. 470\u2013475 (2012). https:\/\/doi.org\/10.1109\/ths.2012.6459894","key":"43_CR16","DOI":"10.1109\/ths.2012.6459894"},{"doi-asserted-by":"publisher","unstructured":"Kim, D., Woo, J., Kim, H.K.: \u201cI know what you did before\u201d: general framework for correlation analysis of cyber threat incidents. In: MILCOM 2016 - 2016 IEEE Military Communications Conference, Baltimore, MD, 2016, pp. 782\u2013787 (2016). https:\/\/doi.org\/10.1109\/milcom.2016.7795424","key":"43_CR17","DOI":"10.1109\/milcom.2016.7795424"},{"unstructured":"Flizikowski, A., Zych, J., Ho\u0142ubowicz, W.: Methodology for gathering data concerning incidents in cyberspace. In: 2012 Military Communications and Information Systems Conference (MCC), Gdansk, 2012, pp. 1\u20138. (2012)","key":"43_CR18"},{"unstructured":"Schulze, M., Reinhold, T.: Wannacry about the tragedy of the commons? Game-theory and the failure of global vulnerability disclosure. In: ECCWS 2018 17th European Conference on Cyber Warfare and Security 2018 Jun 21 (p. 454). Academic Conferences and publishing limited","key":"43_CR19"},{"doi-asserted-by":"publisher","unstructured":"Golandsky, Y.: Cyber crisis management, survival or extinction? In: 2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA), London, 2016, pp. 1\u20134 (2016). https:\/\/doi.org\/10.1109\/cybersa.2016.7503291","key":"43_CR20","DOI":"10.1109\/cybersa.2016.7503291"},{"unstructured":"Miyachi, T., Narita, H., Yamada, H., Furuta, H.: Myth and reality on control system security revealed by stuxnet. In: SICE annual conference 2011, Tokyo, 2011, pp. 1537\u20131540","key":"43_CR21"},{"issue":"3","key":"43_CR22","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSPEC.2013.6471059","volume":"50","author":"D Kushner","year":"2013","unstructured":"Kushner, D.: The real story of stuxnet. IEEE Spectr. 50(3), 48\u201353 (2013)","journal-title":"IEEE Spectr."},{"doi-asserted-by":"publisher","unstructured":"Dehlawi, Z., Abokhodair, N.: Saudi Arabia\u2019s response to cyber conflict: a case study of the Shamoon malware incident. In: 2013 IEEE International Conference on Intelligence and Security Informatics, Seattle, WA, 2013, pp. 73\u201375 (2013). https:\/\/doi.org\/10.1109\/isi.2013.6578789","key":"43_CR23","DOI":"10.1109\/isi.2013.6578789"},{"doi-asserted-by":"publisher","unstructured":"Gupta, R., Prasad, K.H., Mohania, M.: Automating ITSM incident management process. In: 2008 International Conference on Autonomic Computing, Chicago, IL, 2008, pp. 141\u2013150 (2008). https:\/\/doi.org\/10.1109\/icac.2008.22","key":"43_CR24","DOI":"10.1109\/icac.2008.22"},{"doi-asserted-by":"publisher","unstructured":"Silva, S., Pereira, R., Ribeiro, R.: Machine learning in incident categorization automation. In: 2018 13th Iberian Conference on Information Systems and Technologies (CISTI), Caceres, 2018, pp. 1\u20136 (2018). https:\/\/doi.org\/10.23919\/cisti.2018.8399244","key":"43_CR25","DOI":"10.23919\/cisti.2018.8399244"},{"unstructured":"Classification: precision and recall (2018). https:\/\/developers.google.com\/machine-learning\/crash-course\/classification\/precision-and-recall. Accessed 02 June 2018","key":"43_CR26"},{"unstructured":"Logistic Regression: Calculating a probability (2018). https:\/\/developers.google.com\/machine-learning\/crash-course\/logistic-regression\/calculating-a-probability. Accessed 02 June 2018","key":"43_CR27"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances on P2P, Parallel, Grid, Cloud and Internet Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02607-3_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,22]],"date-time":"2024-06-22T15:13:18Z","timestamp":1719069198000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02607-3_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,17]]},"ISBN":["9783030026066","9783030026073"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02607-3_43","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2018,10,17]]},"assertion":[{"value":"17 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"3PGCIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on P2P, Parallel, Grid, Cloud and Internet Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taichung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pgcic2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}