001461266 000__ 07138cam\a2200745\i\4500 001461266 001__ 1461266 001461266 003__ OCoLC 001461266 005__ 20230503003344.0 001461266 006__ m\\\\\o\\d\\\\\\\\ 001461266 007__ cr\un\nnnunnun 001461266 008__ 230316s2023\\\\si\a\\\\o\\\\\100\0\eng\d 001461266 019__ $$a1372398895 001461266 020__ $$a9789811964145$$q(electronic bk.) 001461266 020__ $$a9811964149$$q(electronic bk.) 001461266 020__ $$z9789811964138 001461266 020__ $$z9811964130 001461266 0247_ $$a10.1007/978-981-19-6414-5$$2doi 001461266 035__ $$aSP(OCoLC)1372321993 001461266 040__ $$aYDX$$beng$$erda$$epn$$cYDX$$dGW5XE$$dEBLCP$$dN$T 001461266 049__ $$aISEA 001461266 050_4 $$aQA76.9.A25 001461266 08204 $$a005.8$$223/eng/20230316 001461266 1112_ $$aInternational Conference on Cybersecurity, Situational Awareness and Social Media$$d(2022 :$$cWales). 001461266 24510 $$aProceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media :$$bCyber Science 2022; 20-21 June; Wales /$$cCyril Onwubiko [and six others], editors. 001461266 24630 $$aCyber Science 2022 001461266 264_1 $$aSingapore :$$bSpringer,$$c[2023] 001461266 264_4 $$c©2023 001461266 300__ $$a1 online resource (xxvi, 476 pages) :$$billustrations (chiefly color). 001461266 336__ $$atext$$btxt$$2rdacontent 001461266 337__ $$acomputer$$bc$$2rdamedia 001461266 338__ $$aonline resource$$bcr$$2rdacarrier 001461266 4901_ $$aSpringer proceedings in complexity 001461266 500__ $$aConference proceedings. 001461266 5050_ $$aIntro -- Cyber Science 2022 Committee -- Preface -- Sponsors and Partners -- Keynote and Industry Panel Speakers -- Contents -- Contributors -- Cyber Threat Intelligence, Ransomware Datasets and Attack Detection -- Practical Cyber Threat Intelligence in the UK Energy Sector -- 1 Introduction -- 2 Background -- 2.1 Barriers to CTI Sharing -- 2.2 Current CTI Sharing in the UK Energy Sector -- 2.3 Evaluation of Sharing Methods and Platforms -- 3 Methodology -- 3.1 Experimental Configuration -- 3.2 CTI Sharing Models -- 3.3 Tags and Taxonomies -- 3.4 Sharing in MISP -- 4 Verifying Sharing Models 001461266 5058_ $$a4.1 Source and Subscriber -- 4.2 Hub and Spoke -- 4.3 Peer to Peer -- 4.4 Hybrid -- 5 Verifying Taxonomies-Events and Tags -- 6 Discussion -- 7 Conclusions -- 7.1 Future Work -- References -- A Free and Community-Driven Critical Infrastructure Ransomware Dataset -- 1 Introduction -- 2 Ransomware Datasets -- 2.1 Strain-Based Ransomware Datasets -- 2.2 Detection-Based Ransomware Datasets -- 2.3 Payment-Based Ransomware Datasets -- 2.4 The Need for a Critical Infrastructure Ransomware Dataset -- 3 Critical Infrastructure Ransomware Dataset -- 3.1 Obtain -- 3.2 Scrub -- 3.3 Explore -- 3.4 Limitations 001461266 5058_ $$a3.5 Dataset Format, Hosting, and Usage Tracking -- 4 Requesters and Dataset Use -- 4.1 Industry -- 4.2 Government -- 4.3 Educators -- 4.4 Students -- 4.5 Journalists/reporters -- 5 Incorporating Recommendations to Make the Dataset Community-Driven -- 5.1 Recommendation 1: Document Modifications (V10.1, August 2020) -- 5.2 Recommendation 2: MITRE ATT&CK Mapping (V10.1, August 2020) -- 5.3 Reporting Missing Incidents and the Contributors Tab (V10.4, Oct 2020) -- 6 Conclusion -- 6.1 Recommendations that Could not Be Accommodated -- References 001461266 5058_ $$aCriteria for Realistic and Expedient Scenarios for Tabletop Exercises on Cyber Attacks Against Industrial Control Systems in the Petroleum Industry -- 1 Introduction -- 2 Background -- 2.1 Scenario Development -- 2.2 Characteristics of a Scenario -- 2.3 Characteristics of a Tabletop Exercise -- 3 Method -- 4 Results -- 4.1 Interview Findings -- 4.2 List of Criteria -- 4.3 Example Scenarios -- 5 Discussion -- 6 Conclusion -- References -- CERTs and Maritime Cybersecurity -- Exploring the Need for a CERT for the Norwegian Construction Sector -- 1 Introduction -- 2 Background 001461266 5058_ $$a2.1 Challenges Specific to the Construction Sector -- 2.2 Working Method and Analytical Framework -- 2.3 Limitations -- 3 National Frameworks for ICT Security -- 3.1 Framework for Handling ICT Security Incidents -- 3.2 Sectoral Response Units -- 3.3 ICT Security Units (CERT) -- 3.4 International Collaboration Forums -- 4 Results from Interviews -- 4.1 Vulnerabilities -- 4.2 Incident Management -- 4.3 Challenges Facing the Industry -- 4.4 Sector CERT -- 5 Summary and Conclusions -- 5.1 The Needs of the Industry -- 5.2 Organization of an ISAC -- References 001461266 506__ $$aAccess limited to authorized users. 001461266 520__ $$aThis book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. Chapters Municipal CybersecurityA Neglected Research Area? A Survey of Current Research", "The Transnational Dimension of Cybersecurity: The NIS Directive and its Jurisdictional Challenges" and "Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. 001461266 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed March 16, 2023). 001461266 650_0 $$aComputer security$$vCongresses. 001461266 650_0 $$aSituational awareness$$xData processing$$vCongresses. 001461266 650_0 $$aArtificial intelligence$$vCongresses. 001461266 650_0 $$aSocial media$$vCongresses. 001461266 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001461266 655_7 $$aConference papers and proceedings.$$2lcgft 001461266 655_0 $$aElectronic books. 001461266 7001_ $$aOnwubiko, Cyril,$$d1972-$$eeditor.$$1https://isni.org/isni/0000000356647172 001461266 77608 $$iPrint version:$$z9811964130$$z9789811964138$$w(OCoLC)1338831822 001461266 830_0 $$aSpringer proceedings in complexity. 001461266 852__ $$bebk 001461266 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-981-19-6414-5$$zOnline Access$$91397441.1 001461266 909CO $$ooai:library.usi.edu:1461266$$pGLOBAL_SET 001461266 980__ $$aBIB 001461266 980__ $$aEBOOK 001461266 982__ $$aEbook 001461266 983__ $$aOnline 001461266 994__ $$a92$$bISE