{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T00:24:33Z","timestamp":1769732673111,"version":"3.49.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,6,22]],"date-time":"2022-06-22T00:00:00Z","timestamp":1655856000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,6,22]]},"DOI":"10.1109\/dsc54232.2022.9888795","type":"proceedings-article","created":{"date-parts":[[2022,9,26]],"date-time":"2022-09-26T17:10:18Z","timestamp":1664212218000},"page":"1-8","source":"Crossref","is-referenced-by-count":3,"title":["An Engineering Process Framework for Cybersecurity Incident Response Assessment"],"prefix":"10.1109","author":[{"given":"Robert L.","family":"Freas","sequence":"first","affiliation":[{"name":"Texas A&#x0026;M University - Commerce,Cybersecurity &#x0026; Computer Science, RELLIS,Bryan,Texas,USA"}]},{"given":"Heather F.","family":"Adair","sequence":"additional","affiliation":[{"name":"Sam Houston State University,MSLS, Newton Gresham Library,Huntsville,Texas,USA"}]},{"given":"Eman","family":"Hammad","sequence":"additional","affiliation":[{"name":"Texas A&#x0026;M University - Commerce,Cybersecurity &#x0026; Computer Science, RELLIS,Bryan,Texas,USA"}]}],"member":"263","reference":[{"key":"ref33","author":"mackie","year":"2021","journal-title":"Log4j Attack Methods Explained by CrowdStrike"},{"key":"ref32","author":"vicens","year":"2021","journal-title":"The Log4j flaw is the latest reminder that quick security fixes are easier said than done"},{"key":"ref31","year":"2021","journal-title":"ShoStack + Friends Blog Colonial Pipeline DarkSide and Models"},{"key":"ref30","year":"2021","journal-title":"Independent post-incident review 2021"},{"key":"ref36","year":"2021","journal-title":"The numbers behind the Log4j vulnerability CVE-2021&#x2013;44228"},{"key":"ref35","year":"2021","journal-title":"Protect yourself against the Apache Log4j vulnerability CheckPoint Blog"},{"key":"ref34","year":"0"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1177\/1071181319631016"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/asi.24311"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2020.113476"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102482"},{"key":"ref14","first-page":"531","article-title":"How do organizations learn from information system incidents? A synthesis of the past, present, and future","volume":"46","author":"mehrizi","year":"2022","journal-title":"MIS Ouarterly"},{"key":"ref15","year":"2016","journal-title":"Pilot's handbook of aeronautical knowledge"},{"key":"ref16","author":"pahl","year":"2007","journal-title":"Engineering Design A Systematic Approach"},{"key":"ref17","year":"2017","journal-title":"Total Quality Management Basic principles & implementation of TQM Study of Manufacturing System Blog post"},{"key":"ref18","year":"2016","journal-title":"November 7 1940 Collapse of the Tacoma Narrows Bridge"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511805073"},{"key":"ref28","year":"0","journal-title":"The Engineering Design Process"},{"key":"ref4","year":"2021","journal-title":"Ransomware The true cost to business A global study on ransomware business impact CyberReason"},{"key":"ref27","author":"lahav","year":"2021","journal-title":"SUNBURST Attack Flow C2 Protocol and Prevention CyNet"},{"key":"ref3","year":"2021","journal-title":"Cost of a Data Breach Report 2021"},{"key":"ref6","author":"sobers","year":"2021","journal-title":"81 ransomware statistics data trends and facts for 2021 | Varonis"},{"key":"ref29","year":"2018","journal-title":"Utilize maturity models to identify program weaknesses"},{"key":"ref5","year":"2017","journal-title":"Integrating the Engineering Design Process and challenge-based learning in STEM"},{"key":"ref8","year":"2020","journal-title":"Ransomware Guide"},{"key":"ref7","year":"2021","journal-title":"The state of ransomware 2021"},{"key":"ref2","year":"2021","journal-title":"Cyber Threats in the Pipeline Using Lessons From the Colonial Ransomware Attack to Defend Critical Infrastructure"},{"key":"ref9","year":"0","journal-title":"CMMC process maturity"},{"key":"ref1","author":"meharchandani","year":"2021","journal-title":"10 major cyber attacks witnessed globally in Q1 2021"},{"key":"ref20","year":"0","journal-title":"Bridge design-bridge construction | Golden Gate"},{"key":"ref22","year":"0","journal-title":"What is the MITRE ATT &CK framework? | Get the 101 Guide |McAfee"},{"key":"ref21","author":"petroski","year":"1992","journal-title":"To Engineer Is Human The Role of Failure in Successful Design"},{"key":"ref24","year":"2012","journal-title":"Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology"},{"key":"ref23","year":"2018","journal-title":"NIST Releases Version 1 1 of its Popular Cybersecurity Framework"},{"key":"ref26","year":"2020","journal-title":"Highly evasive attacker leverages SolarWinds Supply Chain to compromise multiple global victims with SunBurst Backdoor | Mandiant"},{"key":"ref25","year":"2020","journal-title":"FireEye SolarWinds U S Treasury what's happening in the cyber security world right now?"}],"event":{"name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","location":"Edinburgh, United Kingdom","start":{"date-parts":[[2022,6,22]]},"end":{"date-parts":[[2022,6,24]]}},"container-title":["2022 IEEE Conference on Dependable and Secure Computing (DSC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9888143\/9888794\/09888795.pdf?arnumber=9888795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,14]],"date-time":"2022-10-14T16:55:38Z","timestamp":1665766538000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9888795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,22]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/dsc54232.2022.9888795","relation":{},"subject":[],"published":{"date-parts":[[2022,6,22]]}}}