{"id":"https://openalex.org/W4297099515","doi":"https://doi.org/10.1109/dsc54232.2022.9888803","title":"How National CSIRTs Operate: Personal Observations and Opinions from MyCERT","display_name":"How National CSIRTs Operate: Personal Observations and Opinions from MyCERT","publication_year":2022,"publication_date":"2022-06-22","ids":{"openalex":"https://openalex.org/W4297099515","doi":"https://doi.org/10.1109/dsc54232.2022.9888803"},"language":"en","primary_location":{"id":"doi:10.1109/dsc54232.2022.9888803","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888803","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071222420","display_name":"Sharifah Roziah Binti Mohd Kassim","orcid":"https://orcid.org/0009-0005-8603-9583"},"institutions":[{"id":"https://openalex.org/I122655420","display_name":"RCSI & UCD Malaysia Campus","ror":"https://ror.org/0474gs458","country_code":"MY","type":"healthcare","lineage":["https://openalex.org/I122655420"]},{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB","MY"],"is_corresponding":true,"raw_author_name":"Sharifah Roziah Binti Mohd Kassim","raw_affiliation_strings":["MyCERT, CyberSecurity Malaysia,Malaysia","MyCERT, CyberSecurity Malaysia, Malaysia","Institute of Cyber Security for Society (iCSS) & School of Computing, University of Kent, Canterbury, UK"],"affiliations":[{"raw_affiliation_string":"MyCERT, CyberSecurity Malaysia,Malaysia","institution_ids":["https://openalex.org/I122655420"]},{"raw_affiliation_string":"MyCERT, CyberSecurity Malaysia, Malaysia","institution_ids":[]},{"raw_affiliation_string":"Institute of Cyber Security for Society (iCSS) & School of Computing, University of Kent, Canterbury, UK","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000502542","display_name":"Solahuddin Bin Shamsuddin","orcid":null},"institutions":[{"id":"https://openalex.org/I122655420","display_name":"RCSI & UCD Malaysia Campus","ror":"https://ror.org/0474gs458","country_code":"MY","type":"healthcare","lineage":["https://openalex.org/I122655420"]}],"countries":["MY"],"is_corresponding":false,"raw_author_name":"Solahuddin Bin Shamsuddin","raw_affiliation_strings":["MyCERT, CyberSecurity Malaysia,Malaysia","MyCERT, CyberSecurity Malaysia, Malaysia"],"affiliations":[{"raw_affiliation_string":"MyCERT, CyberSecurity Malaysia,Malaysia","institution_ids":["https://openalex.org/I122655420"]},{"raw_affiliation_string":"MyCERT, CyberSecurity Malaysia, Malaysia","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100745576","display_name":"Shujun Li","orcid":"https://orcid.org/0000-0001-5628-7328"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shujun Li","raw_affiliation_strings":["Institute of Cyber Security for Society (iCSS) &#x0026; School of Computing, University of Kent,Canterbury,UK"],"affiliations":[{"raw_affiliation_string":"Institute of Cyber Security for Society (iCSS) &#x0026; School of Computing, University of Kent,Canterbury,UK","institution_ids":["https://openalex.org/I20581793"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5025663670","display_name":"Budi Arief","orcid":"https://orcid.org/0000-0002-1830-1587"},"institutions":[{"id":"https://openalex.org/I20581793","display_name":"University of Kent","ror":"https://ror.org/00xkeyj56","country_code":"GB","type":"education","lineage":["https://openalex.org/I20581793"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Budi Arief","raw_affiliation_strings":["Institute of Cyber Security for Society (iCSS) &#x0026; School of Computing, University of Kent,Canterbury,UK"],"affiliations":[{"raw_affiliation_string":"Institute of Cyber Security for Society (iCSS) &#x0026; School of Computing, University of Kent,Canterbury,UK","institution_ids":["https://openalex.org/I20581793"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5071222420"],"corresponding_institution_ids":["https://openalex.org/I122655420","https://openalex.org/I20581793"],"apc_list":null,"apc_paid":null,"fwci":0.2763,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.56610029,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9876999855041504,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9369999766349792,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/national-security","display_name":"National security","score":0.6707308292388916},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.659690797328949},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.5166692733764648},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.4285883605480194},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3661805987358093},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.34822404384613037},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3047470450401306},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2805081903934479},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.21237346529960632}],"concepts":[{"id":"https://openalex.org/C528167355","wikidata":"https://www.wikidata.org/wiki/Q258307","display_name":"National security","level":2,"score":0.6707308292388916},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.659690797328949},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.5166692733764648},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.4285883605480194},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3661805987358093},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.34822404384613037},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3047470450401306},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2805081903934479},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.21237346529960632},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/dsc54232.2022.9888803","is_oa":false,"landing_page_url":"https://doi.org/10.1109/dsc54232.2022.9888803","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 IEEE Conference on Dependable and Secure Computing (DSC)","raw_type":"proceedings-article"},{"id":"pmh:oai:kar.kent.ac.uk:97693","is_oa":false,"landing_page_url":"https://doi.org/10.1109/DSC54232.2022.9888803>)","pdf_url":null,"source":{"id":"https://openalex.org/S4377196264","display_name":"Kent Academic Repository (University of Kent)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I20581793","host_organization_name":"University of Kent","host_organization_lineage":["https://openalex.org/I20581793"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","score":0.5400000214576721,"display_name":"Industry, innovation and infrastructure"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":5,"referenced_works":["https://openalex.org/W2070901481","https://openalex.org/W2972007171","https://openalex.org/W2990495326","https://openalex.org/W4400992744","https://openalex.org/W6870311995"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W138768472","https://openalex.org/W2806948274","https://openalex.org/W4401278346","https://openalex.org/W2367714496","https://openalex.org/W2538131842","https://openalex.org/W2351190957","https://openalex.org/W1597034473","https://openalex.org/W2103482891","https://openalex.org/W2012862864"],"abstract_inverted_index":{"Computer":[0],"Security":[1],"Incident":[2],"Response":[3],"Teams":[4],"(CSIRTs)":[5],"have":[6],"been":[7],"established":[8],"at":[9,58,73],"national":[10,51,59,76,82],"and":[11,17,53,66,96,98,105,117],"organisational":[12],"levels":[13],"to":[14,16,119],"respond":[15],"mitigate":[18],"cyber":[19,33],"incidents.":[20],"National":[21],"CSIRTs":[22,52],"play":[23],"a":[24,29],"critical":[25],"role":[26],"in":[27,50],"defending":[28],"nation's":[30],"infrastructure":[31],"from":[32,68],"attacks.":[34],"However,":[35],"the":[36,89,99,123],"research":[37,116],"literature":[38],"lacks":[39],"studies":[40],"that":[41],"can":[42,112],"provide":[43],"first-hand":[44],"insights":[45],"on":[46],"current":[47],"operational":[48,84],"practices":[49,85],"challenges":[54],"faced":[55],"by":[56],"staff":[57,72],"CSIRTs.":[60],"This":[61],"paper":[62,111],"provides":[63],"personal":[64],"observations":[65],"opinions":[67],"two":[69],"members":[70],"of":[71,81,91,94,101,103,122],"MyCERT":[74],"(Malaysia's":[75],"CSIRT),":[77],"regarding":[78],"important":[79],"areas":[80],"CSIRTs'":[83],"including":[86],"cross-CSIRT":[87],"collaboration,":[88],"lack":[90,100],"systematic":[92],"use":[93],"data":[95,104],"tools,":[97],"evaluation":[102],"tools":[106],"used.":[107],"We":[108],"hope":[109],"this":[110],"help":[113],"stimulate":[114],"more":[115],"work":[118],"address":[120],"some":[121],"gaps":[124],"we":[125],"identified.":[126]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
