{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T03:13:44Z","timestamp":1767064424470,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030202569"},{"type":"electronic","value":"9783030202576"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-20257-6_41","type":"book-chapter","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T02:39:49Z","timestamp":1557801589000},"page":"476-487","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)"],"prefix":"10.1007","author":[{"given":"Spyridon","family":"Papastergiou","sequence":"first","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"Eleni-Maria","family":"Kalogeraki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"West-Brown, M.J., Stikvoort, D., Kossakowski, K.P., Killcrece, G., Ruefle, R.: Handbook for computer security incident response teams (CSIRTs). (No. CMU\/SEI-2003-HB-002). Carnegie-Mellon Univ Pittsburgh PA Software Engineering Inst. (2003a)","key":"41_CR1","DOI":"10.21236\/ADA413778"},{"unstructured":"Wiik, J., Kossakowski, K.P.: Dynamics of incident response. In: 17th Annual FIRST Conference on Computer Security Incident Handling, Singapore (2005)","key":"41_CR2"},{"unstructured":"British Standards Institution. BS ISO\/IEC 27035:2011 - Information Technology. Security Techniques. Information Security Incident Management (2011)","key":"41_CR3"},{"key":"41_CR4","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-61r2","volume-title":"Computer Security Incident Handling Guide Recommendations","author":"P Cichonski","year":"2012","unstructured":"Cichonski, P., Scarfone, K.: Computer Security Incident Handling Guide Recommendations. NIST, Gaithersburg (2012). National Institute of Standards and Technology (NIST)"},{"unstructured":"ENISA CSIRTs by Country-Interactive Map. \n                    https:\/\/www.enisa.europa.eu\/topics\/csirts-in-europe\/csirt-inventory\/certs-by-country-interactive-map","key":"41_CR5"},{"unstructured":"Northcutt, S.: Computer Security Incident Handling Version 2.3.1 (2003)","key":"41_CR6"},{"doi-asserted-by":"crossref","unstructured":"Vangelos, M.: Incident response: managing. In: Encyclopedia of Information Assurance, pp. 1442\u20131449. Taylor & Francis (2011)","key":"41_CR7","DOI":"10.1081\/E-EIA-120046844"},{"issue":"1","key":"41_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1108\/09685221011035241","volume":"18","author":"R Werlinger","year":"2010","unstructured":"Werlinger, R., Muldner, K., Hawkey, K., Beznosov, K.: Preparation, detection, and analysis: the diagnostic work of it security incident response. Inf. Manag. Comput. Secur. 18(1), 26\u201342 (2010)","journal-title":"Inf. Manag. Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Khurana, H., Basney, J., Bakht, M., Freemon, M., Welch, V., Butler, R.: Palantir: a framework for collaborative incident response and investigation. In: Proceedings of the 8th Symposium on Identity and Trust on the Internet, p. 38e51 (2009)","key":"41_CR9","DOI":"10.1145\/1527017.1527023"},{"doi-asserted-by":"crossref","unstructured":"Grobauer, B., Schreck, T.: Towards incident handling in the cloud. In: Proceedings of the 2010 ACM Workshop on Cloud Computing Security Workshop (CCSW 10), pp. 77\u201385 (2010)","key":"41_CR10","DOI":"10.1145\/1866835.1866850"},{"key":"41_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1186\/2192-113X-1-16","volume":"1","author":"A Monfared","year":"2012","unstructured":"Monfared, A., Jaatun, M.G.: Handling compromised components in an IaaS cloud installation. J. Cloud Comput. Adv. Syst. Appl. 1, 16 (2012)","journal-title":"J. Cloud Comput. Adv. Syst. Appl."},{"doi-asserted-by":"crossref","unstructured":"Line, M.B.: A case study: preparing for the smart grids-identifying current practice for information security incident management in the power industry. In: 2013 7 International Conference on IT Security Incident Management and IT Forensics, IT Security Incident Management and IT Forensics (IMF), pp. 26\u201332. IEEE (2013)","key":"41_CR12","DOI":"10.1109\/IMF.2013.15"},{"doi-asserted-by":"crossref","unstructured":"Cusick, J.J., Ma, G.: Creating an ITIL inspired incident management approach: roots, response, and results. In: Network Operations and Management Symposium Workshops (NOMS Wksps) 2010 IEEE\/IFIP, pp. 142\u2013148. IEEE (2010)","key":"41_CR13","DOI":"10.1109\/NOMSW.2010.5486589"},{"doi-asserted-by":"crossref","unstructured":"Connell, A., Palko, T., Yasar, H.: Cerebro: a platform for collaborative incident response and investigation. In: 2013 IEEE International Conference on Technologies for Homeland Security (HST) (2013)","key":"41_CR14","DOI":"10.1109\/THS.2013.6699007"},{"issue":"5","key":"41_CR15","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1016\/j.cose.2012.04.001","volume":"31","author":"A Ahmad","year":"2012","unstructured":"Ahmad, A., Hadgkiss, J., Ruighaver, A.B.: Incident response teams-challenges in supporting the organisational security function. Comput. Secur. 31(5), 643\u2013652 (2012)","journal-title":"Comput. Secur."},{"unstructured":"Shedden, P., Ahmad, A., Ruighaver, A.B.: Informal learning in security incident response teams. In: 2011 Australasian Conference on Information Systems (2011)","key":"41_CR16"},{"issue":"2","key":"41_CR17","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1145\/1113034.1113068","volume":"49","author":"E Casey","year":"2006","unstructured":"Casey, E.: Investigating sophisticated security breaches. Commun. ACM 49(2), 48\u201355 (2006)","journal-title":"Commun. ACM"},{"doi-asserted-by":"crossref","unstructured":"Nnoli, H., Lindskog, D., Zavarsky, P., Aghili, S., Ruhl, R.: The governance of corporate forensics using COBIT, NIST and increased automated forensic approaches. In: 2012 International Conference on Privacy, Security, Risk and Trust. IEEE (2012)","key":"41_CR18","DOI":"10.1109\/SocialCom-PASSAT.2012.109"},{"unstructured":"Tan, T., Ruighaver, T., Ahmad, A.: Incident handling: where the need for planning is often not recognised. In: 1st Australian Computer, Network & Information Forensics Conference (2003)","key":"41_CR19"},{"unstructured":"FireEye. The Need for Speed: 2013 Incident Response Survey (2013)","key":"41_CR20"},{"unstructured":"Grispos, G., Glisson, W.B., Storer, T.: Rethinking security incident response: the integration of agile principles. arXiv preprint \n                    arXiv:1408.2431\n                    \n                   (2014)","key":"41_CR21"},{"key":"41_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cose.2014.11.006","volume":"49","author":"NH Ab Rahman","year":"2015","unstructured":"Ab Rahman, N.H., Choo, K.K.R.: A survey of information security incident handling in the cloud. Comput. Secur. 49, 45\u201369 (2015)","journal-title":"Comput. Secur."},{"issue":"1","key":"41_CR23","first-page":"42","volume":"14","author":"S Papastergiou","year":"2017","unstructured":"Papastergiou, S., Polemi, D.: Securing maritime logistics and supply chain: the Medusa and MITIGATE approaches. Maritime Interdiction Operations Journal 14(1), 42\u201348 (2017). Proceedings of 2nd NMIOTIC Conference on Cyber Security. ISSN 2242-441X","journal-title":"Maritime Interdiction Operations Journal"},{"key":"41_CR24","series-title":"LNNS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-981-10-6916-1_1","volume-title":"Smart Trends in Systems, Security and Sustainability","author":"S Papastergiou","year":"2018","unstructured":"Papastergiou, S., Polemi, N.: MITIGATE: a dynamic supply chain cyber risk assessment methodology. In: Yang, X.S., Nagar, A., Joshi, A. (eds.) Smart Trends in Systems, Security and Sustainability. LNNS, vol. 18, pp. 1\u20139. Springer, Heidelberg (2018). \n                    https:\/\/doi.org\/10.1007\/978-981-10-6916-1_1"},{"unstructured":"Kalogeraki, E.-M., Papastergiou, S., Polemi N.: SAURON real-life use cases: terrorists attack a cruise ship berthed at a port facility. In: The 9th NMIOTC Annual Conference \u201cFostering Projection of Stability through Maritime Security: Achieving Enhanced Capabilities and Operational Effectiveness\u201d 5\u20137 June 2018 (2018)","key":"41_CR25"}],"container-title":["Communications in Computer and Information Science","Engineering Applications of Neural Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-20257-6_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T10:54:29Z","timestamp":1572260069000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-20257-6_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030202569","9783030202576"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-20257-6_41","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"15 May 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EANN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering Applications of Neural Networks","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xersonisos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eann2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.eann2019.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}