{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:42:46Z","timestamp":1752550966631,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031371196"},{"type":"electronic","value":"9783031371202"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-37120-2_11","type":"book-chapter","created":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:04:56Z","timestamp":1687993496000},"page":"162-178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Prevention of Cyber-Attacks and Privacy Breaches in Healthcare Sector"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4354-3916","authenticated-orcid":false,"given":"Antonio","family":"Scarf\u00f2","sequence":"first","affiliation":[]},{"given":"Carmine","family":"Piccolo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1760-5527","authenticated-orcid":false,"given":"Francesco","family":"Palmieri","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6415-1180","authenticated-orcid":false,"given":"Michele","family":"Mastroianni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,29]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Ponemon Institute LLC, September 16, 2022: Cost of a Data Breach Report 2022. https:\/\/www.ibm.com\/downloads\/cas\/3R8N1DZJ. Accessed 25 Mar 2023","DOI":"10.12968\/S1353-4858(22)70049-9"},{"key":"11_CR2","unstructured":"Ifigeneia Lella, Eleni Tsekmezoglou, Rossen Svetozarov Naydenov, Cosmin Ciobanu, Apostolos Malatras, Marianthi Theocharidou \u2013 European Union Agency for Cybersecurit, October 2022, ENISA Threat Landscape 2022. https:\/\/www.enisa.europa.eu\/publications\/enisa-threat-landscape-2022. Accessed 25 Mar 2023"},{"key":"11_CR3","unstructured":"Cybersecurity Advisory (CSA), Infrastructure Security Agency (CISA), National Security Agency (NSA), Federal Bureau of Investigation (FBI), Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security, (CCCS), New Zealand National Cyber Security Centre (NZ NCSC), United Kingdom\u2019s National, Cyber Security Centre (NCSC-UK), 27 April 2022, 2021 Top Routinely Exploited Vulnerabilities. https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/AA22-117A_Joint_CSA_2021_Top_Routinely_Exploited_Vulnerabilities_Final.pdf. Accessed 25 Mar 2023"},{"key":"11_CR4","unstructured":"Foriguard Labs, 16 Agust 2022, \u201cGlobal Threat Landscape Report, 1H 2022. https:\/\/www.fortinet.com\/content\/dam\/fortinet\/assets\/threat-reports\/threat-report-1h-2022.pdf. Accessed 25 Mar 2023"},{"key":"11_CR5","doi-asserted-by":"publisher","unstructured":"Ahmed, M., Panda, S., Xenakis, C., Panaousis, E.: MITRE ATT&CK-driven Cyber Risk Assessment. In: Proceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022. Association for Computing Machinery, New York, NY, USA, Article 107, pp. 1\u201310 (2022). https:\/\/doi.org\/10.1145\/3538969.3544420","DOI":"10.1145\/3538969.3544420"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Waltermire (NIST), D., Scarfone (G2), K.: Guide to Using Vulnerability Naming Schemes, February 2011. https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-51\/rev-1\/final","DOI":"10.6028\/NIST.SP.800-51r1"},{"key":"11_CR7","unstructured":"U.S. Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), The MITRE Corporation, About the CVE Program. https:\/\/www.cve.org\/. Accessed 25 Mar 2023"},{"key":"11_CR8","unstructured":"Forum of Incident Response and Security Teams, FIRST Vision and Mission Statement. www.first.org\/about\/mission. Accessed 25 Mar 2023"},{"key":"11_CR9","unstructured":"Aluri, S.: Posted on Sep 28, 2022 and Updated on September 29, 2022, All about LockBit Ransomware. https:\/\/cybersecurityworks.com\/blog\/ransomware\/all-about-lockbit-ransomware.html. Accessed 25 Mar 2023"},{"key":"11_CR10","unstructured":"By Ravindran, P.: posted on Jul 14, 2022 and Updated on 06 Sep 2022, All about BlackCat (ALPHV). https:\/\/cybersecurityworks.com\/blog\/ransomware\/all-about-blackcat-alphav.html. Accessed 25 Mar 2023"},{"key":"11_CR11","unstructured":"Narang, S.: ContiLeaks: Chats Reveal Over 30 Vulnerabilities Used by Conti Ransomware, 24 March 2022. https:\/\/www.tenable.com\/blog\/contileaks-chats-reveal-over-30-vulnerabilities-used-by-conti-ransomware-affiliates. Accessed 25 Mar 2023"},{"key":"11_CR12","unstructured":"Lei, C., Zhang, Z., Hu, C., Das, A.: Mirai Variant V3G4 Targets IoT Devices, 15 February 2023. https:\/\/unit42.paloaltonetworks.com\/mirai-variant-v3g4\/. Accessed 25 Mar 2023"},{"key":"11_CR13","unstructured":"Astle, J., et al.: 2022 Threat Detection Report, Mar 25 2023. https:\/\/resource.redcanary.com\/rs\/003-YRU-314\/images\/2022_ThreatDetectionReport_RedCanary.pdf"},{"key":"11_CR14","doi-asserted-by":"crossref","unstructured":"Singleton, C., et al.: X-Force Threat Intelligence Index 2022, February 2022. https:\/\/www.ibm.com\/downloads\/cas\/ADLMYLAZ. Accessed 25 Mar 2023","DOI":"10.12968\/S1361-3723(22)70561-1"},{"key":"11_CR15","doi-asserted-by":"publisher","unstructured":"Kuppa, A., Aouad, L., Le-Khac, N.-A.: Linking CVE\u2019s to MITRE ATT&CK Techniques. In: Proceedings of the 16th International Conference on Availability, Reliability and Security (ARES 21). Association for Computing Machinery, New York, NY, USA, Article 21, pp. 1\u201312 (2021). https:\/\/doi.org\/10.1145\/3465481.3465758","DOI":"10.1145\/3465481.3465758"},{"key":"11_CR16","doi-asserted-by":"publisher","first-page":"6877","DOI":"10.1002\/int.22866","volume":"37","author":"T-F Tu","year":"2022","unstructured":"Tu, T.-F., Qin, J.-W., Zhang, H., Chen, M., Xu, T., Huang, Y.: A comprehensive study of Mozi botnet. Int. J. Intell. Syst. 37, 6877\u20136908 (2022). https:\/\/doi.org\/10.1002\/int.22866","journal-title":"Int. J. Intell. Syst."},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"847","DOI":"10.1007\/978-3-030-22354-0_78","volume-title":"Complex, Intelligent, and Software Intensive Systems","author":"B Di Martino","year":"2020","unstructured":"Di Martino, B., Mastroianni, M., Campaiola, M., Morelli, G., Sparaco, E.: Semantic techniques for validation of GDPR compliance of business processes. In: Barolli, L., Hussain, F.K., Ikeda, M. (eds.) Complex, Intelligent, and Software Intensive Systems. AISC, vol. 993, pp. 847\u2013855. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-22354-0_78"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"Bobbio, A., Campanile, L., Gribaudo, M., Iacono M., Marulli F., Mastroianni M.: A cyber warfare perspective on risks related to health IoT devices and contact tracing Neural Comput. Appl. 1\u201315 (2021).https:\/\/doi.org\/10.1007\/s00521-021-06720-1","DOI":"10.1007\/s00521-021-06720-1"},{"issue":"5","key":"11_CR19","doi-asserted-by":"publisher","first-page":"1620","DOI":"10.1007\/s11227-014-1242-6","volume":"71","author":"F Palmieri","year":"2014","unstructured":"Palmieri, F., Ricciardi, S., Fiore, U., Ficco, M., Castiglione, A.: Energy-oriented denial of service attacks: an emerging menace for large cloud infrastructures. J. Supercomput. 71(5), 1620\u20131641 (2014). https:\/\/doi.org\/10.1007\/s11227-014-1242-6","journal-title":"J. Supercomput."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2023 Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-37120-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,28]],"date-time":"2023-06-28T23:38:54Z","timestamp":1687995534000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-37120-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031371196","9783031371202"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-37120-2_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 July 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 July 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Custom based on Cyberchair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"283","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"67","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"13","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8,5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PHD Showcase Papers: 6(for main conf) \/ For ICCSA 2023 Workshops 876 subm sent, 350 full papers and 29 short papers accepted, additional PHD Showcase Papers: 2","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}