Open Access
Issue
E3S Web Conf.
Volume 412, 2023
International Conference on Innovation in Modern Applied Science, Environment, Energy and Earth Studies (ICIES’11 2023)
Article Number 01076
Number of page(s) 9
DOI https://doi.org/10.1051/e3sconf/202341201076
Published online 17 August 2023
  1. H. Chen, R.H. Chiang, V.C. Storey, Business intelligence and analytics: from big data to big impact, M I S Q, 36, 4 (2012) [Google Scholar]
  2. Li. Yuchong, Liu. Qinghui, A comprehensive review study of cyber-attacks and cyber security; Emerging trends and recent developments, E R 7 (2021) [Google Scholar]
  3. P. Sanders, c. Bronk, MD. Bazilian, Critical energy infrastructure and the evolution of cybersecurity, E J 35, Issue 10 (2022) [Google Scholar]
  4. D. Ventre. Cyberattaque et cyberdéfense, Collection cyberconflits et cybercriminalité, La voisier, Paris (2011) [Google Scholar]
  5. Joint Chiefs of Staff, joint terminology for cyberspace operations, DoD, Etats-Unis, (2010). [Google Scholar]
  6. O. A. Hathaway, R. Crootof, P. Levitz, H. Nix, A. Nowlan, W. Perdue, J. Spiegel, The law of cyber-attack. C L R 100, 4 (2012) [Google Scholar]
  7. F. Pasqualetti, F. Dörfler, F. Bullo, Attack detection and identification in cyberphysical systems, IEEE T A C, 58, 2715-2729, (2013) [CrossRef] [Google Scholar]
  8. C. Lala, B. Panda, Evaluating damage from cyber-attacks: a model and analysis, IEEE T S, 31, 4 (2001) [Google Scholar]
  9. CLUSIF, Club de la sécurité de l’information français, Fiches Incidents Cyber SI Industriels, (2017), Available from: https://clusif.fr/publications/fiches-incidents-cyber-industriels-2017/ [Accessed 08/05/23]. [Google Scholar]
  10. J. M. Lehu, Cyberattaque :la gestion du risque est-elle encore possible ? Analyse et enseignements du cas Sony Pictures, R S G, 291-292, 41-50. (2018) [Google Scholar]
  11. Imrani, O.E. et al., Impact of industrial free zones on the business environment of emerging countries, cta Logistica, 2023, 10(1), pp. 105–110 [CrossRef] [Google Scholar]
  12. A. De Mereuil, A.M. Bonnefous, Anatomie d’une cyber-attaque contre une entreprise: comprendre et prévenir les attaques par déni de service, A M G C, 123, 5-14 (2016) [Google Scholar]
  13. M. Warren, W. Hutchinson, Cyber-attacks against supply chain management systems: a short note, I J P D & L M, 30, 710-716 (2000) [Google Scholar]
  14. J.K. Deane, C.L. Rees, W.H. Baker, Assessing the information technology security risk in medical supply chains, I J E M R, 3, 145-155 (2010) [Google Scholar]
  15. ANSSI, Agence Nationale de la Sécurité des systèmes d’information, Attaques par rançongiciels : comment les anticiper et réagir en cas d’incident, Collection Gestion de Crise Cyber, (2020) [Google Scholar]
  16. ANSSI, Agence Nationale de la Sécurité des Systèmes d’information, Cris d’origine cyber, les clés d’une gestion opérationnelle et stratégique, Collection Gestion de Crise Cyber, (2021) [Google Scholar]
  17. L. Raimondo, les fondamentaux de la gestion de crise cyber, Editions Ellipses, paris, (2022) [Google Scholar]
  18. A. Khursheed, M. Kumar, M. Sharma, Security against cyber-attacks in food industry, I J C T A, 9, 17, 8623-8628 (2016) [Google Scholar]
  19. L. Schaedler, L. Graf-Vlachy, A. Konig, Strategic leadership in organizational crises: A review and research agenda, L R P 55 (2022) [Google Scholar]
  20. C. Kuffner, M. Kopyoto, A.J. Wohlleber, E. Hartmann, The interplay between relationships, technologies and organizational structures in enhancing supply chain resilience: empirical evidence from a Delphi study, I J P D & L M 52, 8, 673-699 (2022) [Google Scholar]
  21. Kassou, M., Bourekkadi, et al. (2021). Blockchain-based medical and water waste management conception. E3S Web of Conferences, 2021, 234, 00070 [CrossRef] [EDP Sciences] [Google Scholar]
  22. El Imrani, O. et al (2022). The consumer price index and it effect in the new ecosystems and energy consumption during the sanitary confinement: The case of an emerging country. IOP Conference Series: Earth and Environmental Science, 975(1), 012006 [CrossRef] [Google Scholar]
  23. A. Tajer, O. Araban, F. E. Belfatmi, S.M. Rigar, Gouvernance et résilience des PME à l’ère de la crise sanitaire du COVID 19. R I S G 5, 3 (2022) [Google Scholar]
  24. ANSSI, Agence Nationale de la Sécurité des Systèmes d’information, Panorama de la Cybermenace, Collection Gestion de Crise Cyber, (2022) [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.