Keywords:
Denial-of-service attack Computer security Software deployment Computer science Malware The Internet Session (web analytics) World Wide Web

Metrics

6
Cited By
1.15
FWCI (Field Weighted Citation Impact)
10
Refs
0.75
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

Network Security and Intrusion Detection
Physical Sciences →  Computer Science →  Computer Networks and Communications
Internet Traffic Analysis and Secure E-voting
Physical Sciences →  Computer Science →  Artificial Intelligence
Advanced Malware Detection Techniques
Physical Sciences →  Computer Science →  Signal Processing

Related Documents

BOOK-CHAPTER

Defending Critical Infrastructures Against Cyber Attacks

Frédéric Lemieux

Palgrave Macmillan eBooks Year: 2015
JOURNAL ARTICLE

Cyber Stealth Attacks in Critical Information Infrastructures

Lorena CazorlaCristina AlcarazJavier López

Journal:   IEEE Systems Journal Year: 2016 Vol: 12 (2)Pages: 1778-1792
JOURNAL ARTICLE

Cyber attacks on critical infrastructures and satellite communications

Antonio Di CarloKim Obergfaell

Journal:   International Journal of Critical Infrastructure Protection Year: 2024 Vol: 46 Pages: 100701-100701
JOURNAL ARTICLE

CYBER RISK OF COORDINATED ATTACKS IN CRITICAL INFRASTRUCTURES

David M. Nicol

Journal:   2018 Winter Simulation Conference (WSC) Year: 2018 Pages: 2759-2768
© 2026 ScienceGate Book Chapters — All rights reserved.