{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:49:24Z","timestamp":1742917764748,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030845315"},{"type":"electronic","value":"9783030845322"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-84532-2_3","type":"book-chapter","created":{"date-parts":[[2021,8,8]],"date-time":"2021-08-08T23:03:52Z","timestamp":1628463832000},"page":"24-31","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Towards AI-Based Reaction and Mitigation\u00a0for\u00a0e-Commerce - the ENSURESEC Engine"],"prefix":"10.1007","author":[{"given":"Marek","family":"Pawlicki","sequence":"first","affiliation":[]},{"given":"Rafa\u0142","family":"Kozik","sequence":"additional","affiliation":[]},{"given":"Damian","family":"Puchalski","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,9]]},"reference":[{"key":"3_CR1","unstructured":"European ecommerce report 2019. https:\/\/tinyurl.com\/4wpmrv52. Accessed 04 May 2021"},{"key":"3_CR2","unstructured":"Ecommerce in Europe: \u20ac717 billion in 2020. https:\/\/tinyurl.com\/hy3x8kwa. Accessed 04 May 2021"},{"key":"3_CR3","unstructured":"Fraud losses in e-commerce on UK-issued credit cards-2019 \u2014 Statista. https:\/\/tinyurl.com\/9bx7dr3n. Accessed 04 May 2021"},{"key":"3_CR4","unstructured":"Survey on \u201cscams and fraud experienced by consumers\u201d. Final report. https:\/\/tinyurl.com\/e6n97hf2. Accessed 04 May 2021"},{"issue":"4","key":"3_CR5","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1287\/deca.2020.0418","volume":"17","author":"A Couce-Vieira","year":"2020","unstructured":"Couce-Vieira, A., Insua, D.R., Kosgodagan, A.: Assessing and forecasting cyber-security impacts. Decis. Anal. 17(4), 356\u2013374 (2020)","journal-title":"Decis. Anal."},{"key":"3_CR6","unstructured":"2020 global threat intelligence report the nature of security: be resilient to thrive. https:\/\/tinyurl.com\/4ayv32xx. Accessed 04 May 2021"},{"issue":"3","key":"3_CR7","doi-asserted-by":"publisher","first-page":"239","DOI":"10.3390\/electronics10030239","volume":"10","author":"S Gong","year":"2021","unstructured":"Gong, S., Lee, C.: Cyber threat intelligence framework for incident response in an energy cloud platform. Electronics 10(3), 239 (2021)","journal-title":"Electronics"},{"key":"3_CR8","doi-asserted-by":"publisher","unstructured":"Xie, W., Yu, X., Zhang, Y., Wang, H.: An improved shapley value benefit distribution mechanism in cooperative game of cyber threat intelligence sharing. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 810\u2013815 (2020). https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS50562.2020.91627399","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.91627399"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Alkalabi, W., Simpson, L., Morarji, H.: Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia. In: 2021 Australasian Computer Science Week Multiconference. ACSW 2021, Association for Computing Machinery, NewYork, NY, USA (2021). https:\/\/doi.org\/10.1145\/3437378.3437391","DOI":"10.1145\/3437378.3437391"},{"issue":"5","key":"3_CR10","doi-asserted-by":"publisher","first-page":"824","DOI":"10.3390\/electronics9050824","volume":"9","author":"A Ramsdale","year":"2020","unstructured":"Ramsdale, A., Shiaeles, S., Kolokotronis, N.: A comparative analysis of cyber-threat intelligence sources, formats and languages. Electronics 9(5), 824 (2020)","journal-title":"Electronics"},{"key":"3_CR11","unstructured":"Stix - structured threat information expression (archive) \u2014 stix project documentation. https:\/\/stixproject.github.io\/. Accessed 04 May 2021"},{"key":"3_CR12","unstructured":"Connolly, J., Davidson, M., Schmidt, C.: The trusted automated exchange of indicator information (TAXII). The MITRE Corporation, pp. 1\u201320 (2014)"},{"key":"3_CR13","unstructured":"Barnum, S., Martin, R., Worrell, B., Kirillov, I.: The cybox language specification. The\u00a0MITRE Corporation (2012)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Schlette, D.: Cyber threat intelligence (2021)","DOI":"10.1007\/978-3-642-27739-9_1717-1"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"de Melo e Silva, A., Costa Gondim, J.J., de Oliveira Albuquerque, R., Garcia Villalba, L.J.: A methodology to evaluate standards and platforms within cyber threat intelligence. Future Internet 12(6), 108 (2020)","DOI":"10.3390\/fi12060108"},{"key":"3_CR16","unstructured":"Endpoint detection & response (EDR) security solutions. https:\/\/www.fortinet.com\/products\/endpoint-security\/fortiedr. Accessed 04 May 2021"},{"key":"3_CR17","unstructured":"Resilient security orchestration, automation and response platform - Egypt \u2014 IBM. https:\/\/tinyurl.com\/8ewe7usx. Accessed 04 May 2021"},{"key":"3_CR18","unstructured":"Network threat detection & response platform\u2014vectraai. https:\/\/www.vectra.ai\/products\/cognito-platform. Accessed 04 May 2021"},{"key":"3_CR19","unstructured":"Event management for full threat visibility \u2014 check point software. https:\/\/www.checkpoint.com\/products\/event-management\/. Accessed 04 May 2021"},{"key":"3_CR20","unstructured":"The hive project. https:\/\/thehive-project.org\/. Accessed 04 May 2021"},{"key":"3_CR21","unstructured":"Cortex XDR - extended detection and response - Palo Alto networks. https:\/\/www.paloaltonetworks.com\/cortex\/cortex-xdr. Accessed 04 May 2021"},{"key":"3_CR22","unstructured":"Data access governance \u2014 active directory security \u2014 privileged access management \u2014 stealthbits. https:\/\/stealthbits.com\/. Accessed 04 May 2021"},{"key":"3_CR23","unstructured":"Misp - open source threat intelligence platform & open standards for threat information sharing (formerly known as malware information sharing platform). https:\/\/www.misp-project.org\/. Accessed 04 May 2021"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Chora\u015b, M., Pawlicki, M.: Intrusion detection approach based on optimised artificial neural network. Neurocomputing (2021)","DOI":"10.1016\/j.neucom.2020.07.138"},{"issue":"16","key":"3_CR25","doi-asserted-by":"publisher","first-page":"4583","DOI":"10.3390\/s20164583","volume":"20","author":"V Dutta","year":"2020","unstructured":"Dutta, V., Chora\u015b, M., Pawlicki, M., Kozik, R.: A deep learning ensemble for network anomaly and cyber-attack detection. Sensors 20(16), 4583 (2020)","journal-title":"Sensors"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Komisarek, M., Chora\u015b, M., Kozik, R., Pawlicki, M.: Real-time stream processing tool for detecting suspicious network patterns using machine learning. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u20137 (2020)","DOI":"10.1145\/3407023.3409189"},{"issue":"6","key":"3_CR27","doi-asserted-by":"publisher","first-page":"783","DOI":"10.1007\/s12652-015-0283-x","volume":"6","author":"R Kozik","year":"2015","unstructured":"Kozik, R., Chora\u015b, M., Flizikowski, A., Theocharidou, M., Rosato, V., Rome, E.: Advanced services for critical infrastructures protection. J. Ambient. Intell. Humaniz. Comput. 6(6), 783\u2013795 (2015). https:\/\/doi.org\/10.1007\/s12652-015-0283-x","journal-title":"J. Ambient. Intell. Humaniz. Comput."}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Theories and Application"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-84532-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T22:45:43Z","timestamp":1673045143000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-84532-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030845315","9783030845322"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-84532-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"9 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2021a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2021\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}