{"id":"https://openalex.org/W4297099534","doi":"https://doi.org/10.1109/dsc54232.2022.9888795","title":"An Engineering Process Framework for Cybersecurity Incident Response Assessment","display_name":"An Engineering Process Framework for Cybersecurity Incident Response Assessment","publication_year":2022,"publication_date":"2022-06-22","ids":{"openalex":"https://openalex.org/W4297099534","doi":"https://doi.org/10.1109/dsc54232.2022.9888795"},"language":"en","primary_location":{"id":"doi:10.1109/dsc54232.2022.9888795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019967287","display_name":"Robert L. Freas","orcid":null},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"East Texas A&M University","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Robert L. Freas","raw_affiliation_strings":["Texas A&#x0026;M University - Commerce,Cybersecurity &#x0026; Computer Science, RELLIS,Bryan,Texas,USA"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University - Commerce,Cybersecurity &#x0026; Computer Science, RELLIS,Bryan,Texas,USA","institution_ids":["https://openalex.org/I206651237"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063471637","display_name":"Heather F. Adair","orcid":"https://orcid.org/0000-0003-4988-4866"},"institutions":[{"id":"https://openalex.org/I191429286","display_name":"Sam Houston State University","ror":"https://ror.org/00yh3cz06","country_code":"US","type":"education","lineage":["https://openalex.org/I191429286"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Heather F. Adair","raw_affiliation_strings":["Sam Houston State University,MSLS, Newton Gresham Library,Huntsville,Texas,USA","MSLS, Newton Gresham Library, Sam Houston State University, Huntsville, Texas, USA"],"affiliations":[{"raw_affiliation_string":"Sam Houston State University,MSLS, Newton Gresham Library,Huntsville,Texas,USA","institution_ids":["https://openalex.org/I191429286"]},{"raw_affiliation_string":"MSLS, Newton Gresham Library, Sam Houston State University, Huntsville, Texas, USA","institution_ids":["https://openalex.org/I191429286"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026015448","display_name":"Eman Hammad","orcid":"https://orcid.org/0000-0001-6069-1550"},"institutions":[{"id":"https://openalex.org/I206651237","display_name":"East Texas A&M University","ror":"https://ror.org/01red3556","country_code":"US","type":"education","lineage":["https://openalex.org/I206651237"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Eman Hammad","raw_affiliation_strings":["Texas A&#x0026;M University - Commerce,Cybersecurity &#x0026; Computer Science, RELLIS,Bryan,Texas,USA"],"affiliations":[{"raw_affiliation_string":"Texas A&#x0026;M University - Commerce,Cybersecurity &#x0026; Computer Science, RELLIS,Bryan,Texas,USA","institution_ids":["https://openalex.org/I206651237"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019967287"],"corresponding_institution_ids":["https://openalex.org/I206651237"],"apc_list":null,"apc_paid":null,"fwci":0.6362,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.74674003,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9815000295639038,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/incident-response","display_name":"Incident response","score":0.8194175362586975},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7137613892555237},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.6561142802238464},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.6453704833984375},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6133134365081787},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.3292935788631439}],"concepts":[{"id":"https://openalex.org/C2985105721","wikidata":"https://www.wikidata.org/wiki/Q13479512","display_name":"Incident response","level":2,"score":0.8194175362586975},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7137613892555237},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.6561142802238464},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.6453704833984375},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6133134365081787},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.3292935788631439},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/dsc54232.2022.9888795","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888795","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2313351254","https://openalex.org/W2982205235","https://openalex.org/W2990495326","https://openalex.org/W3114913914","https://openalex.org/W3116016377","https://openalex.org/W3200587221","https://openalex.org/W3216877984","https://openalex.org/W4246394460","https://openalex.org/W6804513522"],"related_works":["https://openalex.org/W2158491338","https://openalex.org/W2807901368","https://openalex.org/W2133733652","https://openalex.org/W2072658171","https://openalex.org/W2606392311","https://openalex.org/W2320042380","https://openalex.org/W4385956668","https://openalex.org/W2900895161","https://openalex.org/W4380838366","https://openalex.org/W3088911518"],"abstract_inverted_index":{"Recent":[0],"incidents":[1],"and":[2,13,27,40,69,84,97,116,130,135,145],"continuous":[3],"cyber":[4,60,137],"attacks":[5,157],"highlight":[6],"that":[7,108],"most":[8],"currently":[9],"adopted":[10],"cybersecurity":[11,65],"solutions":[12],"processes":[14,30,46,70,125],"remain":[15],"highly":[16],"reactive,":[17],"with":[18],"short-lived":[19],"remedies.":[20],"The":[21],"critical":[22],"need":[23],"for":[24,58],"more":[25,34,110,114],"proactive":[26,115],"mature":[28,44],"response":[29,62,67,88,139],"has":[31],"never":[32],"been":[33],"critical.":[35],"We":[36],"look":[37],"at":[38],"engineering":[39,50,102],"borrow":[41],"concepts":[42,99],"from":[43,100],"systematic":[45],"such":[47],"as":[48],"the":[49,77,85,98,101,143,148],"design":[51,103],"process":[52,104],"to":[53,112,133,154],"develop":[54],"a":[55,92,113,128],"new":[56],"framework":[57],"activer":[59],"incident":[61,66,87],"processes.":[63,140],"Currently,":[64],"structure":[68],"are":[71],"outlined":[72],"in":[73],"multiple":[74],"frameworks":[75,96],"including":[76],"MITRE":[78],"ATT&CK":[79],"framework,":[80,83,150],"NIST's":[81],"Cybersecurity":[82],"traditional":[86],"(IR)":[89],"lifecycle.":[90],"Using":[91],"blend":[93],"of":[94,147],"those":[95],"we":[105,151],"propose":[106],"O2I":[107],"is":[109],"adept":[111],"sustainable":[117,129],"security":[118,138],"response.":[119],"With":[120],"proper":[121],"implementation,":[122],"O2I's":[123],"iterative":[124],"could":[126],"provide":[127],"adaptable":[131],"approach":[132],"assess":[134],"improve":[136],"To":[141],"validate":[142],"benefits":[144],"feasibility":[146],"proposed":[149],"utilize":[152],"it":[153],"evaluate":[155],"recent":[156],"using":[158],"publicly":[159],"available":[160],"information.":[161]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
