Analyzing Vulnerabilities Of Critical Infrastructures Using Flows And Critical Vertices In And/Or Graphs.
Yvo DesmedtYongge WangPublished in: Int. J. Found. Comput. Sci. (2004)
Keyphrases
- critical information
- critical infrastructure
- information security
- weighted graph
- cyber security
- cyber attacks
- homeland security
- power grids
- high priority
- smart grid
- telecommunication systems
- countermeasures
- security issues
- information systems
- control system
- climate change
- intrusion detection
- access control
- decision making