Login / Signup
Exploiting the critical infrastructure via nontraditional system inputs.
Lucille McMinn
Jonathan Butts
David Robinson
Billy Rios
Published in:
CSIIRW (2011)
Keyphrases
</>
critical infrastructure
cyber security
information security
cyber defense
control system
cyber attacks
homeland security
smart grid
risk analysis
data acquisition
risk management
network security
business continuity
real time
intrusion detection
access control
data collection
data mining techniques
expert systems