Information Security threats and attacks with conceivable counteraction | IEEE Conference Publication | IEEE Xplore