Open Access
Issue
E3S Web Conf.
Volume 680, 2025
The 4th International Conference on Energy and Green Computing (ICEGC’2025)
Article Number 00018
Number of page(s) 12
DOI https://doi.org/10.1051/e3sconf/202568000018
Published online 19 December 2025
  1. Piotr Lis and Jacob Mendel. Cyber security of critical infrastructure: an economic perspective. Economics and Business Review, Volume 5 (19), Number 2, 2019. [Google Scholar]
  2. John Moteff, Claudia Copeland, and John Fischer “Critical Infrastructures: What Makes an Infrastructure Critical? [Google Scholar]
  3. Zhang, Chi. & Ramirez-Marquez, José Emmanuel & Wang, Jianhui., 2015. “Critical infrastructure protection using secrecy – A discrete simultaneous game,” European Journal of Operational Research, Elsevier, vol. 242(1), pages 212-221 [Google Scholar]
  4. Politique régionale de protection des infrastructures critiques de la CEDEAO [Google Scholar]
  5. Directive 2008/114/CE du Conseil, du 8 décembre 2008, concernant le recensement et la désignation des infrastructures critiques européennes ainsi que l’évaluation de la nécessité d’améliorer leur protection. [Google Scholar]
  6. Thiaca THIAW, La Protection des Infrastructures, Ressources et Activités d’Importance Vitale : Législation et Pratiques au Sénégal [Google Scholar]
  7. Conseil des Technologies de et des Communications (CTIC). Infrastructures critiques dans une économie hyperconnectée. Aout 2016. [Google Scholar]
  8. Jean-Franc¸ois PILLOU et Jean-Philippe BAY. Tout sur la sécurité informatique. Livre, DUNOD, 4eme ` edition, Février 2016. [Google Scholar]
  9. https://www.bloomberg.com/news/features/2019-12-20/spidermanhacker-daniel-kaye-took-down-liberia-s-internet [Google Scholar]
  10. Michael Holloway. Stuxnet Worm Attack on Iranian Nuclear Facilities. Stanford University, July 2015. [Google Scholar]
  11. W. Broad, J. Markoff, and D. Sanger, “Israeli Test on Worm Called Crucial in Iran Nuclear Delay,” New York Times, 15 Jan 11. [Google Scholar]
  12. B. Kesler, “The Vulnerability of Nuclear Facilities to Cyber Attack,” Strategic Insights 10, 15 (2011). [Google Scholar]
  13. L. Constantin, “S. Korean manufacturing industry targeted with new backdoor program,” Computer World, 2015. [Google Scholar]
  14. Trend Micro, “Kansas Hospital Hit by Ransomware, Extorted Twice, “Security News, 2016. [Google Scholar]
  15. W. J. W. Cox, ““MedStar Health turns away patients after likely ransomware cyberattack,” Washington Post, 25 May 2016 [Google Scholar]
  16. R. Winton,”“Hollywood Hospital pays 17,000 dollars in bitcoin to hackers; FBI investigating,” L.A Times, 2016. [Google Scholar]
  17. https://siecledigital.fr/2019/07/26/lafrique-du-sud-a-ete-visee-parunegigantesque-cyberattaque/ [Google Scholar]
  18. A. Wang, A. Mohaisen, and S. Chen, “An adversary-centric behavior modeling of DDoS attacks,” in ICDCS. IEEE, 2017, [Google Scholar]
  19. M. Nogueira, A. A. Santos, and J. M. F. Moura, “Early signals from volumetric DDoS attacks: An empirical study,” arXiv, vol. 2, 2017. [Google Scholar]
  20. B. M. Rahal, A. Santos and M. Nogueira, “A Distributed Architecture for DDoS Prediction and Bot Detection,” in IEEE Access, vol. 8, pp. 159756-159772, 2020, doi: 10.1109/ACCESS.2020.3020507. [Google Scholar]
  21. K. B. Virupakshar, M. Asundi, K. Channal, P. Shettar, S. Patil and D. G. Narayan, “Distributed denial of service (DDoS) attacks detection system for OpenStack-based private cloud”, Procedia Comput. Sci., vol. 167, pp. 2297-2307, Jan. 2020. [Google Scholar]
  22. Sharyar Wani, Mohammed Imthiyas, Hamad Almohamedh, Khalid M Alhamed, Sultan Almotairi, “Distributed Denial of Service (DDoS) Mitigation Using Blockchain—A Comprehensive Insight”, Symmetry 2021, 13, 227. https://doi.org/10.3390/sym13020227. and Yonis Gulzar [Google Scholar]
  23. D. Li, Z. Wang and Y. Xue, “Fine-grained Android Malware Detection based on Deep Learning,” 2018 IEEE Conference on Communications and Network Security (CNS), Beijing, 2018, pp. 1-2. [Google Scholar]
  24. R. Vinayakumar, M. Alazab, K. P. Soman, P. Poornachandran and S. Venkatraman, “Robust Intelligent Malware Detection Using Deep Learning,” in IEEE Access, vol. 7, pp. 46717-46738, 2019. [Google Scholar]
  25. Dali Zhu, Hao Jin, Ying Yang, D. Wu and Weiyi Chen,” DeepFlow: Deep learning-based malware detection by mining Android application for abnormal usage of sensitive data,” 2017 IEEE Symposium on Computers and Communications (ISCC), Heraklion, 2017, pp. 438-443. [Google Scholar]
  26. Hackers Enigma, “McAfee Labs Threats Report – June 2018,” McAfee Labs, 2018. [Google Scholar]
  27. S. G. Raj Samani, “McAfee Labs Threats Report,” McAfee Report, p.27, June 2018. [Google Scholar]
  28. Q. L. X. Luo, “Awareness Education as the key to ransomware prevention,” Information security, vol. 4, no. 16, pp. 195-202, 2008 [Google Scholar]
  29. Q. L. X. Luo, “Ransomware: a new cyber hijacking threat to enterprises,” Handbook research on information security and assurance, vol. 1, no. 1, pp. 1-6, 2008 [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.