{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T12:39:39Z","timestamp":1743079179554,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031138317"},{"type":"electronic","value":"9783031138324"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-13832-4_22","type":"book-chapter","created":{"date-parts":[[2022,8,15]],"date-time":"2022-08-15T11:32:22Z","timestamp":1660563142000},"page":"257-266","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Efficient Post Event Analysis and Cyber Incident Response in IoT and E-commerce Through Innovative Graphs and Cyberthreat Intelligence Employment"],"prefix":"10.1007","author":[{"given":"Rafa\u0142","family":"Kozik","sequence":"first","affiliation":[]},{"given":"Marek","family":"Pawlicki","sequence":"additional","affiliation":[]},{"given":"Mateusz","family":"Szczepa\u0144ski","sequence":"additional","affiliation":[]},{"given":"Rafa\u0142","family":"Renk","sequence":"additional","affiliation":[]},{"given":"Micha\u0142","family":"Chora\u015b","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,16]]},"reference":[{"key":"22_CR1","unstructured":"2020\u00a0Global Threat Intelligence Report. The nature of security: be resilient to thrive.\u00a0\u00a0https:\/\/tinyurl.com\/4ayv32xx. Accessed 04 May\u00a02021"},{"key":"22_CR2","unstructured":"Ecommerce in europe: \u20ac717 billion in (2020).\u00a0https:\/\/tinyurl.com\/hy3x8kwa. Accessed 04 May\u00a02021"},{"key":"22_CR3","unstructured":"European ecommerce report (2019).\u00a0https:\/\/tinyurl.com\/4wpmrv52.\u00a0Accessed 04 May\u00a02021"},{"key":"22_CR4","unstructured":"Fraud losses in e-commerce on uk-issued credit cards-2019 \u2014 statista.\u00a0https:\/\/tinyurl.com\/9bx7dr3n. Accessed 04 May\u00a02021"},{"key":"22_CR5","unstructured":"Good practice guide for incident management \u2014 enisa.\u00a0https:\/\/www.enisa.europa.eu\/publications\/good-practice-guide-for-incident-management. Accessed 05 Apr 2022"},{"key":"22_CR6","unstructured":"Survey on \u201cscams and fraud experienced by consumers\u201d. final report.\u00a0https:\/\/tinyurl.com\/e6n97hf2. Accessed 04 May\u00a02021"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.cose.2014.11.006","volume":"49","author":"NH Ab Rahman","year":"2015","unstructured":"Ab Rahman, N.H., Choo, K.-K.R.: A survey of information security incident handling in the cloud. Comput.\u00a0 Secur. 49, 45\u201369 (2015)","journal-title":"Comput.\u00a0 Secur."},{"key":"22_CR8","doi-asserted-by":"publisher","first-page":"100365","DOI":"10.1016\/j.iot.2021.100365","volume":"14","author":"R Ahmad","year":"2021","unstructured":"Ahmad, R., Alsmadi, I.: Machine learning approaches to IoT security: a systematic literature review. Internet of Things 14, 100365 (2021)","journal-title":"Internet of Things"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Alkalabi, W., Simpson, L., Morarji, H.: Barriers and incentives to cybersecurity threat information sharing in developing countries: a case study of Saudi Arabia. In: 2021 Australasian Computer Science Week Multiconference. ACSW2021. Association for Computing Machinery, New York (2021).\u00a0https:\/\/doi.org\/10.1145\/3437378.3437391","DOI":"10.1145\/3437378.3437391"},{"issue":"61","key":"22_CR10","first-page":"1","volume":"800","author":"P Cichonski","year":"2012","unstructured":"Cichonski, P., Millar, T., Grance, T., Scarfone, K., et al.: Computer security incident handling guide. NIST Spec. Publ. 800(61), 1\u2013147 (2012)","journal-title":"NIST Spec. Publ."},{"issue":"4","key":"22_CR11","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1287\/deca.2020.0418","volume":"17","author":"A Couce-Vieira","year":"2020","unstructured":"Couce-Vieira, A., Insua, D.R., Kosgodagan, A.: Assessing and forecasting cybersecurity impacts. Decis. Anal. 17(4), 356\u2013374 (2020)","journal-title":"Decis. Anal."},{"key":"22_CR12","unstructured":"Eshghi, B.: IoT cybersecurity in 2022: vulnerabilities countermeasures. AI Multiple (2022). Accessed 03 Nov 2022"},{"issue":"3","key":"22_CR13","doi-asserted-by":"publisher","first-page":"239","DOI":"10.3390\/electronics10030239","volume":"10","author":"S Gong","year":"2021","unstructured":"Gong, S., Lee, C.: Cyber threat intelligence framework for incident response in an energy cloud platform. Electronics 10(3), 239 (2021)","journal-title":"Electronics"},{"key":"22_CR14","unstructured":"Lee, J.W., Song, J.G., Son, J.Y., Choi, J.G.: Propositions for effective cyber incident handling (2018)"},{"key":"22_CR15","unstructured":"Pauna, A., Moulinos, K., Lakka, M., May, J., Tryfonas, T.: Can we learn from SCADA security incidents. White Paper, European Union Agency for Network and Information Security, Heraklion, Crete, Greece (2013)"},{"key":"22_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31703-4","volume-title":"Cyber Security: The Lifeline of Information and Communication Technology","author":"R Prasad","year":"2020","unstructured":"Prasad, R., Rohokale, V.: Cyber Security: The Lifeline of Information and Communication Technology. Springer, Cham (2020)"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Spyridopoulos, T., Tryfonas, T., May, J.: Incident analysis & digital forensics in SCADA and industrial control systems (2013)","DOI":"10.1049\/cp.2013.1720"},{"key":"22_CR18","unstructured":"U.S. Department of health and human services office for civil rights: breach portal: notice to the secretary of HHS breach of unsecured protected health information (2022). Accessed 03 Nov 2022"},{"key":"22_CR19","doi-asserted-by":"publisher","unstructured":"Xie, W., Yu, X., Zhang, Y., Wang, H.: An improved shapley value benefit distribution mechanism in cooperative game of cyber threat intelligence sharing. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pp. 810\u2013815 (2020). https:\/\/doi.org\/10.1109\/INFOCOMWKSHPS50562.2020.9162739","DOI":"10.1109\/INFOCOMWKSHPS50562.2020.9162739"}],"container-title":["Lecture Notes in Computer Science","Intelligent Computing Methodologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-13832-4_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T14:06:15Z","timestamp":1710338775000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-13832-4_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031138317","9783031138324"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-13832-4_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"16 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/2022\/index.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Open","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"IC-ICC-CN","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"449","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"209","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}