Getting Security Objectives Wrong: A Cautionary Tale of an Industrial Control System (Transcript of Discussion).
Simon N. FoleyPublished in: Security Protocols Workshop (2017)
Keyphrases
- control system
- industrial automation
- critical infrastructure
- security issues
- information security
- fuzzy logic
- control algorithm
- access control
- closed loop
- intrusion detection
- control scheme
- control strategy
- industrial applications
- security requirements
- statistical databases
- security policies
- multiple objectives
- computer security
- pid controller
- fuzzy controller
- control method
- fuzzy control
- network security
- security systems
- security threats
- industrial processes
- neural network