{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T16:17:49Z","timestamp":1754151469199,"version":"3.41.2"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:00:00Z","timestamp":1750204800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,18]]},"DOI":"10.1109\/ntms65597.2025.11076705","type":"proceedings-article","created":{"date-parts":[[2025,7,18]],"date-time":"2025-07-18T17:42:27Z","timestamp":1752860547000},"page":"168-173","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Situational Aware-Based Cybersecurity Remediation"],"prefix":"10.1109","author":[{"given":"Rayan","family":"Kanawati","sequence":"first","affiliation":[{"name":"ALEKSO entreprise 1 rue Joseph Lahuec,Le Plessis-Robinson,France,92350"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nadira","family":"Lammari","sequence":"additional","affiliation":[{"name":"CEDRIC laboratory Conservatoire National des Arts et M&#x00E9;tiers 292 rue Saint Martin,Paris,France,75003"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Adam","family":"Faci","sequence":"additional","affiliation":[{"name":"CEDRIC laboratory Conservatoire National des Arts et M&#x00E9;tiers 292 rue Saint Martin,Paris,France,75003"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nada","family":"Mimouni","sequence":"additional","affiliation":[{"name":"CEDRIC laboratory Conservatoire National des Arts et M&#x00E9;tiers 292 rue Saint Martin,Paris,France,75003"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Rapport d\u2019activit\u00e9 2023 Au coeur de l\u2019action Cyber","author":"ACYMA","year":"2024"},{"key":"ref2","article-title":"ISO_IEC_27035-3 Information technology Information security incident management Part 3: Guidelines for ICT incident response operations","year":"2020"},{"key":"ref3","article-title":"ISO_IEC_27035-1 Information technology-Security techniques-Information security incident management Part 1: Principles of incident management","year":"2016"},{"key":"ref4","article-title":"ISO_IEC_27035-2 Information technology-Security techniques-Information security incident management Part 2: Guidelines to plan and prepare for incident response","year":"2016"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-61r2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78816-6_15"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.05.100"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/iccasm.2010.5623194"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/icitis.2010.5689586"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/edm52169.2021.9507632"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/imf.2015.13"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2020.09.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ecai50035.2020.9223163"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/comm48946.2020.9141989"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3168446"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3074021"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-21441-7_21"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103201"},{"key":"ref19","article-title":"ISO\/IEC 27000:2018(en) Information technology-Security techniques Information security management systems-Overview and vocabulary","year":"2018"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/noms.2016.7502931"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2172\/751004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.24251\/hicss.2021.242"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20816-9_15"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/rusautocon52004.2021.9537385"},{"key":"ref25","article-title":"Cyber Resilient Organization Study 2021","year":"2020"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102122"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102482"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.3390\/s19051114"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/iccworkshops50388.2021.9473869"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/latincom.2010.5641013"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.34190\/iccws.17.1.6"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/access.2022.3171252"},{"key":"ref33","article-title":"An Incident Management Ontology","author":"Mundie","year":"2014"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/wi.2018.00-55"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-01554-1_23"},{"key":"ref36","article-title":"stix-v2.1.pdf","author":"Piazza","year":"2024"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17487\/rfc7970"},{"key":"ref38","article-title":"CACAO Security Playbooks Version 2.0","author":"Bret","year":"2023"},{"issue":"6","key":"ref39","doi-asserted-by":"crossref","first-page":"1726","DOI":"10.1152\/ajplegacy.1975.229.6.1726","article-title":"ATTACK Design and Philosophy March 2020.pdf","volume":"229","author":"Durbin","year":"2020","journal-title":"Am J Physiol"},{"key":"ref40","article-title":"Toward a Knowledge Graph of Cybersecurity Countermeasures","author":"Kaloroumakis","year":"2021"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2024.2318884"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.3390\/ai3010005"}],"event":{"name":"2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)","location":"Paris, France","start":{"date-parts":[[2025,6,18]]},"end":{"date-parts":[[2025,6,20]]}},"container-title":["2025 12th IFIP International Conference on New Technologies, Mobility and Security (NTMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11076604\/11076612\/11076705.pdf?arnumber=11076705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,19]],"date-time":"2025-07-19T04:50:47Z","timestamp":1752900647000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11076705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,18]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/ntms65597.2025.11076705","relation":{},"subject":[],"published":{"date-parts":[[2025,6,18]]}}}