Open Access
Issue
E3S Web Conf.
Volume 376, 2023
International Scientific and Practical Conference “Environmental Risks and Safety in Mechanical Engineering” (ERSME-2023)
Article Number 05045
Number of page(s) 6
Section V Socio-cultural, Political, Economic, and Legal Issues Related to Environmental Stewardship
DOI https://doi.org/10.1051/e3sconf/202337605045
Published online 31 March 2023
  1. A. Andersson, K. Hedström, F. Karlsson, Information & Management 59(3), 103623 (2022) DOI: https://doi.org/10.1016/j.im.2022.103623 [CrossRef] [Google Scholar]
  2. A. Vedadi, M. Warkentin, A. Dennis, Information & Management 58(8), 103526 (2021) DOI: https://doi.org/10.1016/j.im.2021.103526 [CrossRef] [Google Scholar]
  3. J. Kim, H. Kwon, Computers & Security 120, 102789 (2022) DOI:https://doi.org/10.1016/j.cose.2022.102789 [Google Scholar]
  4. M. Hemmatfar, M. Salehi, M. Bayat, International Journal of Business and Management 5(7), 158–169 (2010) DOI: https://doi.org/10.5539/ijbm.v5n7p158 [CrossRef] [Google Scholar]
  5. H. Elkhannoubi, M. Belaissaoui, Fundamental pillars for an effective cybersecurity strategy in Computer Systems and Applications (AICCSA) (2015) DOI:https://doi.org/10.1109/AICCSA.2015.7507241 [Google Scholar]
  6. S. Kramer, J.C. Bradfield, J Comput Virol 6, 105– 114 (2018) DOI:https://doi.org/10.1007/s11416-009-0137-1 [Google Scholar]
  7. McAfee. Net losses: Estimating the Global Cost of Cybercrime (2014) URL:https://www.csis.org/analysis/net-losses-estimating-global-cost-cybercrime [Google Scholar]
  8. H. Hu, W. Han, S. Kyung, J. Wang, et all., Computers & Security 87, 101597 (2019) DOI: https://doi.org/10.1016/j.cose.2019.101597 [Google Scholar]
  9. I. Smirnov, O. Safaryan, P. Razumov, V. Porksheyan et al, 3rd International Conference on Computer Applications and Information 9096741 (2020) https://doi.org/10.1109/ICCAIS48893.2020.9096741 [Google Scholar]
  10. A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, Cybersecurity 2(1), 1–21 (2019) DOI: https://doi.org/10.1186/s42400-019-0038-7 [CrossRef] [Google Scholar]
  11. L. Cherckesova, P. Chub, 3rd International Conference on Computer Applications and Information Security 9096729 (2020) https://doi.org/10.1109/ICCAIS48893.2020.9096729 [Google Scholar]
  12. Physical Penetration Testing Methods (That Actually Work), available at: https://purplesec.us/physical-penetration-testing/, Date Views 29. 12.2022 [Google Scholar]
  13. T. Dimkov, W. Pieters, Physical Penetration Testing: A Whole New Story in Penetration Testing (2011) https://www.researchgate.net/publication/254860594_Physical_Penetration_Testing_A_Whole_New_Story_in_Penetration_Testing [Google Scholar]
  14. Corporate Raider: Definition, Tactics, Example, URL: https://www.investopedia.com/terms/c/corporate-raider.asp [Google Scholar]
  15. CCleaner Professional, URL: www.ccleaner.com/ru-ru/ccleaner [Google Scholar]
  16. Free File Shredder, URL:www.fileshredder.org [Google Scholar]
  17. High-level file operations, available at: https://www.docs.python.org/3/library/shutil.html [Google Scholar]
  18. Vosk real-time voice recognition, available at: https://www.programmersought.com/article/696510547189/ [Google Scholar]
  19. Speech-to-Text request construction, available at: https://cloud.google.com/speech-totext/docs/speech-to-text-requests [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.