{"id":"https://openalex.org/W2945977071","doi":"https://doi.org/10.1007/978-3-030-20257-6_41","title":"Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)","display_name":"Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2945977071","doi":"https://doi.org/10.1007/978-3-030-20257-6_41","mag":"2945977071"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-030-20257-6_41","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-20257-6_41","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://research.brighton.ac.uk/en/publications/630df98a-4f94-4cbc-b96a-2a1c5c566b1e","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Spyridon Papastergiou","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Spyridon Papastergiou","raw_affiliation_strings":["Department of Informatics, University of Piraeus, 80 Karaoli and Dimitriou Str., 18534, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, 80 Karaoli and Dimitriou Str., 18534, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Haralambos Mouratidis","orcid":null},"institutions":[{"id":"https://openalex.org/I71637028","display_name":"University of Brighton","ror":"https://ror.org/04kp2b655","country_code":"GB","type":"education","lineage":["https://openalex.org/I71637028"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Haralambos Mouratidis","raw_affiliation_strings":["School of Computing, Engineering and Mathematics, University of Brighton, Brighton, BN2 4GJ, UK"],"affiliations":[{"raw_affiliation_string":"School of Computing, Engineering and Mathematics, University of Brighton, Brighton, BN2 4GJ, UK","institution_ids":["https://openalex.org/I71637028"]}]},{"author_position":"last","author":{"id":null,"display_name":"Eleni-Maria Kalogeraki","orcid":null},"institutions":[{"id":"https://openalex.org/I154757721","display_name":"University of Piraeus","ror":"https://ror.org/02qs84g94","country_code":"GR","type":"education","lineage":["https://openalex.org/I154757721"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Eleni-Maria Kalogeraki","raw_affiliation_strings":["Department of Informatics, University of Piraeus, 80 Karaoli and Dimitriou Str., 18534, Piraeus, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, University of Piraeus, 80 Karaoli and Dimitriou Str., 18534, Piraeus, Greece","institution_ids":["https://openalex.org/I154757721"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I154757721"],"apc_list":null,"apc_paid":null,"fwci":2.7296,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.89812399,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"476","last_page":"487"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.07699999958276749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.07699999958276749,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.05119999870657921,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.03280000016093254,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.8622999787330627},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.7386999726295471},{"id":"https://openalex.org/keywords/warning-system","display_name":"Warning system","score":0.5965999960899353},{"id":"https://openalex.org/keywords/critical-infrastructure","display_name":"Critical infrastructure","score":0.5889000296592712},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.5425000190734863},{"id":"https://openalex.org/keywords/cyber-threats","display_name":"Cyber threats","score":0.507099986076355},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.44690001010894775},{"id":"https://openalex.org/keywords/emergency-response","display_name":"Emergency response","score":0.37860000133514404}],"concepts":[{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.8622999787330627},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7833999991416931},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.7386999726295471},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6459000110626221},{"id":"https://openalex.org/C29825287","wikidata":"https://www.wikidata.org/wiki/Q1427940","display_name":"Warning system","level":2,"score":0.5965999960899353},{"id":"https://openalex.org/C29852176","wikidata":"https://www.wikidata.org/wiki/Q373338","display_name":"Critical infrastructure","level":2,"score":0.5889000296592712},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.5425000190734863},{"id":"https://openalex.org/C3018725008","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber threats","level":2,"score":0.507099986076355},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.44690001010894775},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4050999879837036},{"id":"https://openalex.org/C3017997152","wikidata":"https://www.wikidata.org/wiki/Q814610","display_name":"Emergency response","level":2,"score":0.37860000133514404},{"id":"https://openalex.org/C2780952636","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident management","level":2,"score":0.36899998784065247},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.35440000891685486},{"id":"https://openalex.org/C2987285537","wikidata":"https://www.wikidata.org/wiki/Q1460420","display_name":"Crisis response","level":2,"score":0.3513000011444092},{"id":"https://openalex.org/C180198813","wikidata":"https://www.wikidata.org/wiki/Q121182","display_name":"Information system","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C201307755","wikidata":"https://www.wikidata.org/wiki/Q4071928","display_name":"Cyber-attack","level":2,"score":0.3131999969482422},{"id":"https://openalex.org/C121017731","wikidata":"https://www.wikidata.org/wiki/Q11661","display_name":"Information technology","level":2,"score":0.3086000084877014},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.30480000376701355},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.2741999924182892},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.27390000224113464},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.27070000767707825},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.25920000672340393},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.25220000743865967}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-030-20257-6_41","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-030-20257-6_41","pdf_url":null,"source":{"id":"https://openalex.org/S2764900261","display_name":"Communications in computer and information science","issn_l":"1865-0929","issn":["1865-0929","1865-0937"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Communications in Computer and Information Science","raw_type":"book-chapter"},{"id":"pmh:oai:pure.atira.dk:openaire/630df98a-4f94-4cbc-b96a-2a1c5c566b1e","is_oa":true,"landing_page_url":"https://research.brighton.ac.uk/en/publications/630df98a-4f94-4cbc-b96a-2a1c5c566b1e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401758","display_name":"University of Brighton Repository (University of Brighton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71637028","host_organization_name":"University of Brighton","host_organization_lineage":["https://openalex.org/I71637028"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Papastergiou, S, Mouratidis, H & Kalogeraki, E M 2019, Cyber security incident handling, warning and response system for the european critical information infrastructures (cyberSANE). in I Maglogiannis, C Jayne, J Macintyre & L Iliadis (eds), Engineering Applications of Neural Networks - 20th International Conference, EANN 2019, Proceedings. vol. 1000, Communications in Computer and Information Science, Springer-Verlag, Cham, pp. 476-487, 20th International Conference on Engineering Applications of Neural Networks, EANN 2019, Hersonissos, Greece, 24/05/19. https://doi.org/10.1007/978-3-030-20257-6_41","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:arXiv.org:2003.05720","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2003.05720","pdf_url":"https://arxiv.org/pdf/2003.05720","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:pure.atira.dk:openaire/630df98a-4f94-4cbc-b96a-2a1c5c566b1e","is_oa":true,"landing_page_url":"https://research.brighton.ac.uk/en/publications/630df98a-4f94-4cbc-b96a-2a1c5c566b1e","pdf_url":null,"source":{"id":"https://openalex.org/S4306401758","display_name":"University of Brighton Repository (University of Brighton)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I71637028","host_organization_name":"University of Brighton","host_organization_lineage":["https://openalex.org/I71637028"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Papastergiou, S, Mouratidis, H & Kalogeraki, E M 2019, Cyber security incident handling, warning and response system for the european critical information infrastructures (cyberSANE). in I Maglogiannis, C Jayne, J Macintyre & L Iliadis (eds), Engineering Applications of Neural Networks - 20th International Conference, EANN 2019, Proceedings. vol. 1000, Communications in Computer and Information Science, Springer-Verlag, Cham, pp. 476-487, 20th International Conference on Engineering Applications of Neural Networks, EANN 2019, Hersonissos, Greece, 24/05/19. https://doi.org/10.1007/978-3-030-20257-6_41","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":16,"referenced_works":["https://openalex.org/W1988453576","https://openalex.org/W2014211033","https://openalex.org/W2015410758","https://openalex.org/W2018513178","https://openalex.org/W2026708637","https://openalex.org/W2027435913","https://openalex.org/W2031999883","https://openalex.org/W2069370369","https://openalex.org/W2079602848","https://openalex.org/W2090913920","https://openalex.org/W2100599034","https://openalex.org/W2104483923","https://openalex.org/W2406934947","https://openalex.org/W2617200927","https://openalex.org/W4246162059","https://openalex.org/W4256531287"],"related_works":[],"abstract_inverted_index":null,"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2019-05-29T00:00:00"}
