2022
DOI: 10.1007/978-3-030-91293-2_11
|View full text |Cite
|
Sign up to set email alerts
|

Cyberattacks Against Critical Infrastructure Facilities and Corresponding Countermeasures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 55 publications
0
3
0
Order By: Relevance
“…Furthermore, the application of graph-based techniques has facilitated the understanding of relationships and interactions between various malware samples, aiding in the identification of malware families and their evolution over time [21,22]. The continuous adaptation and refinement of these detection methods have ensured that cybersecurity systems remain resilient against increasingly sophisticated threats, maintaining the integrity and security of critical infrastructure and data [23,24].…”
Section: Malware Detectionmentioning
confidence: 99%
“…Furthermore, the application of graph-based techniques has facilitated the understanding of relationships and interactions between various malware samples, aiding in the identification of malware families and their evolution over time [21,22]. The continuous adaptation and refinement of these detection methods have ensured that cybersecurity systems remain resilient against increasingly sophisticated threats, maintaining the integrity and security of critical infrastructure and data [23,24].…”
Section: Malware Detectionmentioning
confidence: 99%
“…Malware spreading An attacker can develop malware and spread it to infect smart meters or company servers [138]. Malware can be used to replace or add any function to a device or a system such as sending sensitive information.…”
Section: Attacks Detailsmentioning
confidence: 99%
“…A hacker can modify or distort digital data to spread false information or otherwise compromise digitalized control systems, harming or even obliterating crucial infrastructure functions. 20 The Islamist terrorist organizations (al-Qaeda) had spent time to study security information of western and results to their vulnerability, 21 as American investigators found operatives utilizing telecom switches in several nations. 22 Nowadays, a war is won through the concerted ability to secure information not on the physical strength.…”
Section: Introductionmentioning
confidence: 99%