Keyphrases
Advanced Persistent Threat
40%
Advanced Services
9%
Attacker
9%
Collaborative Systems
36%
Communication Infrastructure
9%
Critical Information Infrastructure
90%
Critical Infrastructure
22%
Cyber
13%
Cyber Crime
13%
Cyber Incident
40%
Cyber Incident Handling
22%
Cyber Security Incidents
40%
Cyber Threats
13%
Cyber-attacks
27%
Cybersecurity Incidents
18%
Dark Web
9%
Digital Age
9%
Digital Environment
18%
Dynamic Response
18%
Dynamic Warning
18%
Europe
9%
Forensic Requirements
9%
Hackers
9%
Handling Process
18%
Handling System
40%
Handling Tools
18%
Healthcare Transportation
36%
ICT Infrastructure
40%
Incident Handling
77%
Incident Response
45%
Information Technology
13%
Information Technology Use
18%
Insecurity
9%
Malware
13%
Modeling Language
13%
Modeling Method
13%
Privacy Requirements
9%
Reactive Approach
18%
Resilience
22%
Response System
63%
Security Attacks
18%
Security Officer
50%
Security Privacy
18%
Security Requirements
9%
Security Threats
40%
Social Engineering
9%
System Team
9%
Warning System
63%
Computer Science
Advanced Persistent Threat
40%
Attack Scenario
18%
Attackers
9%
Collaborative Systems
36%
Critical Information
90%
Critical Infrastructure
27%
Cyber Attack
27%
Cyber Criminal
13%
Cybersecurity
18%
Dark Web
9%
Digital Environment
18%
Handling Technique
18%
Incident Handling
100%
Incident Response
22%
Information Infrastructure
90%
Information Technology
72%
Malware
13%
modeling language
13%
Response System
63%
Security and Privacy
27%
Security Attack
18%
Security Incident
22%
Security Incident Response
40%
Security Officer
50%
Security Operator
36%
Warning System
63%