ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Cooperative Hypothesis Building for Computer Security Incident Response
Mapping Intimacies
◽
10.1007/978-981-16-4177-0_49
◽
2021
◽
pp. 489-497
Author(s):
Shota Motoura
◽
Ayako Hoshino
◽
Itaru Hosomi
Keyword(s):
Computer Security
◽
Incident Response
◽
Security Incident
Download Full-text
Related Documents
Cited By
References
An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
IEEE Security & Privacy
◽
10.1109/msp.2014.85
◽
2014
◽
Vol 12
(5)
◽
pp. 61-67
◽
Cited By ~ 13
Author(s):
Tiffani R. Chen
◽
Daniel B. Shore
◽
Stephen J. Zaccaro
◽
Reeshad S. Dalal
◽
Lois E. Tetrick
◽
...
Keyword(s):
Computer Security
◽
Organizational Psychology
◽
Incident Response
◽
Security Incident
◽
Psychology Perspective
Download Full-text
DSS for computer security incident response applying CBR and collaborative response
Expert Systems with Applications
◽
10.1016/j.eswa.2009.05.100
◽
2010
◽
Vol 37
(1)
◽
pp. 852-870
◽
Cited By ~ 32
Author(s):
Huy Kang Kim
◽
Kwang Hyuk Im
◽
Sang Chan Park
Keyword(s):
Computer Security
◽
Incident Response
◽
Security Incident
Download Full-text
Computer Security Incident Response Teams (CSIRTs)
Handbook of Computer Networks
◽
10.1002/9781118256107.ch39
◽
2012
◽
pp. 632-638
Author(s):
Raymond R. Panko
Keyword(s):
Computer Security
◽
Incident Response
◽
Security Incident
Download Full-text
Computer Security Incident Response Teams
Computer Security Handbook
◽
10.1002/9781118820650.ch56
◽
2015
◽
pp. 56.1-56.39
Author(s):
Michael Miora
◽
M. E. Kabay
◽
Bernie Cowens
Keyword(s):
Computer Security
◽
Incident Response
◽
Security Incident
Download Full-text
On Automation and Orchestration of an Initial Computer Security Incident Response by Introducing Centralized Incident Tracking System
Journal of Information Processing
◽
10.2197/ipsjjip.27.564
◽
2019
◽
Vol 27
(0)
◽
pp. 564-573
Author(s):
Motoyuki Ohmori
Keyword(s):
Computer Security
◽
Tracking System
◽
Incident Response
◽
Security Incident
Download Full-text
Trusting Infrastructure: The Emergence of Computer Security Incident Response, 1989–2005
Technology and Culture
◽
10.1353/tech.2020.0036
◽
2020
◽
Vol 61
(1)
◽
pp. 173-206
Author(s):
Rebecca Slayton
◽
Brian Clarke
Keyword(s):
Computer Security
◽
Incident Response
◽
Security Incident
Download Full-text
Computer security incident response grows up
Computer Fraud & Security
◽
10.1016/s1361-3723(04)00133-2
◽
2004
◽
Vol 2004
(11)
◽
pp. 5-7
◽
Cited By ~ 1
Author(s):
John M. Salomon
◽
Patrik Elsa
Keyword(s):
Computer Security
◽
Incident Response
◽
Security Incident
Download Full-text
Handbook for Computer Security Incident Response Teams (CSIRTs)
10.21236/ada358945
◽
1998
◽
Cited By ~ 5
Author(s):
Moira West-Brown
◽
Don Stikvoort
◽
Klaus-Peter Kossakowski
Keyword(s):
Computer Security
◽
Incident Response
◽
Security Incident
Download Full-text
Computer Security Incident Response Team Effectiveness: A Needs Assessment
Frontiers in Psychology
◽
10.3389/fpsyg.2017.02179
◽
2017
◽
Vol 8
◽
Cited By ~ 3
Author(s):
Rick Van der Kleij
◽
Geert Kleinhuis
◽
Heather Young
Keyword(s):
Computer Security
◽
Needs Assessment
◽
Team Effectiveness
◽
Incident Response
◽
Security Incident
◽
Response Team
Download Full-text
Computer Security Incident Response Team Development and Evolution
IEEE Security & Privacy
◽
10.1109/msp.2014.89
◽
2014
◽
Vol 12
(5)
◽
pp. 16-26
◽
Cited By ~ 22
Author(s):
Robin Ruefle
◽
Audrey Dorofee
◽
David Mundie
◽
Allen D. Householder
◽
Michael Murray
◽
...
Keyword(s):
Computer Security
◽
Team Development
◽
Incident Response
◽
Security Incident
◽
Response Team
◽
Development And Evolution
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close