Fraud in Academic Publishing: Researchers Under Cyber-Attacks
نویسندگان
چکیده
منابع مشابه
APE - Academic Publishing in Europe: Researchers, Librarians and Publishers
Dr. Karl-Peter Winters (German Association of Publishers and Booksellers, Frankfurt, Germany) opened the Fifth International Conference on Academic Publishing in Europe (APE 2010) “Researchers, Librarians and Publishers”. Dr. Winters highlighted that 2009 was yet another important year in the transition to digital publishing, with the topics of reading devices and content carriers gaining more ...
متن کاملIdentifying cyber attacks under local model information
This work considers the problem of detecting corrupted components as well as external attacks in a large scale decentralized system. The electric power system, the transportation system, and generally any computer or network system are examples of large scale systems for which cyberattacks have become an important threat. Despite the recent advances in the theory of detection and identification...
متن کاملAcademic publishing is electronic publishing
Derk Haank began by saying that he wanted to keep his presentation simple and would make only a few statements. The first of these was to say that, although it might be stating the obvious, academic publishing is electronic publishing. It has been remarkable how quickly things have progressed since the invention of the Web, and an EC study recently recognised that the revolution in electronic p...
متن کاملSecure State Estimation of Cyber-Physical Systems under Switching Attacks
This paper deals with secure state estimation against switching mode and signal attacks on cyber-physical systems, possibly affected by adversarial extra fake measurement injection. A stochastic Bayesian approach is undertaken by exploiting Bernoulli and Poisson random sets for modeling the attack existence and, respectively, fake measurements, as well as multiple models for handling the variou...
متن کاملArchitectures for Self-Healing Databases under Cyber Attacks
In this paper, we propose five architectures for self-healing databases under malicious attacks. While traditional secure database systems rely on prevention controls, a self-healing database system can autonomically estimate, locate, isolate, contain, and repair damage caused by attacks in such a way that the database can “heal” itself on-the-fly and continue delivering essential services in t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The American Journal of Medicine
سال: 2017
ISSN: 0002-9343
DOI: 10.1016/j.amjmed.2016.08.030