Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media : Cyber Science 2022; 20-21 June; Wales / Cyril Onwubiko [and six others], editors.
This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emer...
Saved in:
Online Access: |
Full Text (via Springer) |
---|---|
Corporate Author: | |
Other Authors: | |
Other title: | Cyber Science 2022. |
Format: | Conference Proceeding eBook |
Language: | English |
Published: |
Singapore :
Springer,
[2023]
|
Series: | Springer proceedings in complexity.
|
Subjects: |
MARC
LEADER | 00000cam a2200000xi 4500 | ||
---|---|---|---|
001 | b12920779 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 230316s2023 si a o 100 0 eng d | ||
005 | 20240423173522.8 | ||
019 | |a 1372398895 | ||
020 | |a 9789811964145 |q (electronic bk.) | ||
020 | |a 9811964149 |q (electronic bk.) | ||
020 | |z 9789811964138 | ||
020 | |z 9811964130 | ||
024 | 7 | |a 10.1007/978-981-19-6414-5 | |
035 | |a (OCoLC)spr1372321993 | ||
035 | |a (OCoLC)1372321993 |z (OCoLC)1372398895 | ||
037 | |a spr978-981-19-6414-5 | ||
040 | |a YDX |b eng |e rda |e pn |c YDX |d GW5XE |d EBLCP | ||
049 | |a GWRE | ||
050 | 4 | |a QA76.9.A25 | |
111 | 2 | |a International Conference on Cybersecurity, Situational Awareness and Social Media |d (2022 : |c Wales) | |
245 | 1 | 0 | |a Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media : |b Cyber Science 2022; 20-21 June; Wales / |c Cyril Onwubiko [and six others], editors. |
246 | 3 | 0 | |a Cyber Science 2022. |
264 | 1 | |a Singapore : |b Springer, |c [2023] | |
264 | 4 | |c ©2023. | |
300 | |a 1 online resource (xxvi, 476 pages) : |b illustrations (chiefly color) | ||
336 | |a text |b txt |2 rdacontent. | ||
337 | |a computer |b c |2 rdamedia. | ||
338 | |a online resource |b cr |2 rdacarrier. | ||
490 | 1 | |a Springer proceedings in complexity. | |
500 | |a Conference proceedings. | ||
505 | 0 | |a Intro -- Cyber Science 2022 Committee -- Preface -- Sponsors and Partners -- Keynote and Industry Panel Speakers -- Contents -- Contributors -- Cyber Threat Intelligence, Ransomware Datasets and Attack Detection -- Practical Cyber Threat Intelligence in the UK Energy Sector -- 1 Introduction -- 2 Background -- 2.1 Barriers to CTI Sharing -- 2.2 Current CTI Sharing in the UK Energy Sector -- 2.3 Evaluation of Sharing Methods and Platforms -- 3 Methodology -- 3.1 Experimental Configuration -- 3.2 CTI Sharing Models -- 3.3 Tags and Taxonomies -- 3.4 Sharing in MISP -- 4 Verifying Sharing Models. | |
505 | 8 | |a 4.1 Source and Subscriber -- 4.2 Hub and Spoke -- 4.3 Peer to Peer -- 4.4 Hybrid -- 5 Verifying Taxonomies-Events and Tags -- 6 Discussion -- 7 Conclusions -- 7.1 Future Work -- References -- A Free and Community-Driven Critical Infrastructure Ransomware Dataset -- 1 Introduction -- 2 Ransomware Datasets -- 2.1 Strain-Based Ransomware Datasets -- 2.2 Detection-Based Ransomware Datasets -- 2.3 Payment-Based Ransomware Datasets -- 2.4 The Need for a Critical Infrastructure Ransomware Dataset -- 3 Critical Infrastructure Ransomware Dataset -- 3.1 Obtain -- 3.2 Scrub -- 3.3 Explore -- 3.4 Limitations. | |
505 | 8 | |a 3.5 Dataset Format, Hosting, and Usage Tracking -- 4 Requesters and Dataset Use -- 4.1 Industry -- 4.2 Government -- 4.3 Educators -- 4.4 Students -- 4.5 Journalists/reporters -- 5 Incorporating Recommendations to Make the Dataset Community-Driven -- 5.1 Recommendation 1: Document Modifications (V10.1, August 2020) -- 5.2 Recommendation 2: MITRE ATT&CK Mapping (V10.1, August 2020) -- 5.3 Reporting Missing Incidents and the Contributors Tab (V10.4, Oct 2020) -- 6 Conclusion -- 6.1 Recommendations that Could not Be Accommodated -- References. | |
505 | 8 | |a Criteria for Realistic and Expedient Scenarios for Tabletop Exercises on Cyber Attacks Against Industrial Control Systems in the Petroleum Industry -- 1 Introduction -- 2 Background -- 2.1 Scenario Development -- 2.2 Characteristics of a Scenario -- 2.3 Characteristics of a Tabletop Exercise -- 3 Method -- 4 Results -- 4.1 Interview Findings -- 4.2 List of Criteria -- 4.3 Example Scenarios -- 5 Discussion -- 6 Conclusion -- References -- CERTs and Maritime Cybersecurity -- Exploring the Need for a CERT for the Norwegian Construction Sector -- 1 Introduction -- 2 Background. | |
505 | 8 | |a 2.1 Challenges Specific to the Construction Sector -- 2.2 Working Method and Analytical Framework -- 2.3 Limitations -- 3 National Frameworks for ICT Security -- 3.1 Framework for Handling ICT Security Incidents -- 3.2 Sectoral Response Units -- 3.3 ICT Security Units (CERT) -- 3.4 International Collaboration Forums -- 4 Results from Interviews -- 4.1 Vulnerabilities -- 4.2 Incident Management -- 4.3 Challenges Facing the Industry -- 4.4 Sector CERT -- 5 Summary and Conclusions -- 5.1 The Needs of the Industry -- 5.2 Organization of an ISAC -- References. | |
520 | |a This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters Municipal CybersecurityA Neglected Research Area? A Survey of Current Research", "The Transnational Dimension of Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. | ||
588 | 0 | |a Online resource; title from PDF title page (SpringerLink, viewed March 16, 2023) | |
650 | 0 | |a Computer security |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2008101458. | |
650 | 0 | |a Situational awareness |x Data processing |v Congresses. | |
650 | 0 | |a Artificial intelligence |v Congresses. |0 http://id.loc.gov/authorities/subjects/sh2007101476. | |
650 | 0 | |a Social media |v Congresses. | |
650 | 7 | |a Artificial intelligence. |2 fast |0 (OCoLC)fst00817247. | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484. | |
650 | 7 | |a Social media. |2 fast |0 (OCoLC)fst01741098. | |
655 | 7 | |a Conference papers and proceedings. |2 fast |0 (OCoLC)fst01423772. | |
700 | 1 | |a Onwubiko, Cyril, |d 1972- |e editor. |0 http://id.loc.gov/authorities/names/n2011074290 |1 https://isni.org/isni/0000000356647172. |1 http://isni.org/isni/0000000356647172. | |
776 | 0 | 8 | |c Original |z 9811964130 |z 9789811964138 |w (OCoLC)1338831822. |
856 | 4 | 0 | |u https://colorado.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-6414-5 |z Full Text (via Springer) |
830 | 0 | |a Springer proceedings in complexity. |0 http://id.loc.gov/authorities/names/no2013120689. | |
907 | |a .b129207792 |b 05-02-23 |c 04-13-23 | ||
915 | |a - | ||
998 | |a web |b 04-30-23 |c b |d b |e - |f eng |g si |h 0 |i 1 | ||
907 | |a .b129207792 |b 05-01-23 |c 04-13-23 | ||
944 | |a MARS - RDA ENRICHED | ||
956 | |a Springer e-books | ||
956 | |b Springer Nature - Springer Physics and Astronomy eBooks 2023 English International | ||
999 | f | f | |i 83df0019-66e3-533a-80d2-cee35da85cbd |s c1b15b82-082a-52a8-941e-ee0c1f07c9ba |
952 | f | f | |p Can circulate |a University of Colorado Boulder |b Online |c Online |d Online |e QA76.9.A25 |h Library of Congress classification |i web |n 1 |