Fraud in Academic Publishing: Researchers Under Cyber-Attacks

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

APE - Academic Publishing in Europe: Researchers, Librarians and Publishers

Dr. Karl-Peter Winters (German Association of Publishers and Booksellers, Frankfurt, Germany) opened the Fifth International Conference on Academic Publishing in Europe (APE 2010) “Researchers, Librarians and Publishers”. Dr. Winters highlighted that 2009 was yet another important year in the transition to digital publishing, with the topics of reading devices and content carriers gaining more ...

متن کامل

Identifying cyber attacks under local model information

This work considers the problem of detecting corrupted components as well as external attacks in a large scale decentralized system. The electric power system, the transportation system, and generally any computer or network system are examples of large scale systems for which cyberattacks have become an important threat. Despite the recent advances in the theory of detection and identification...

متن کامل

Academic publishing is electronic publishing

Derk Haank began by saying that he wanted to keep his presentation simple and would make only a few statements. The first of these was to say that, although it might be stating the obvious, academic publishing is electronic publishing. It has been remarkable how quickly things have progressed since the invention of the Web, and an EC study recently recognised that the revolution in electronic p...

متن کامل

Secure State Estimation of Cyber-Physical Systems under Switching Attacks

This paper deals with secure state estimation against switching mode and signal attacks on cyber-physical systems, possibly affected by adversarial extra fake measurement injection. A stochastic Bayesian approach is undertaken by exploiting Bernoulli and Poisson random sets for modeling the attack existence and, respectively, fake measurements, as well as multiple models for handling the variou...

متن کامل

Architectures for Self-Healing Databases under Cyber Attacks

In this paper, we propose five architectures for self-healing databases under malicious attacks. While traditional secure database systems rely on prevention controls, a self-healing database system can autonomically estimate, locate, isolate, contain, and repair damage caused by attacks in such a way that the database can “heal” itself on-the-fly and continue delivering essential services in t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The American Journal of Medicine

سال: 2017

ISSN: 0002-9343

DOI: 10.1016/j.amjmed.2016.08.030