Login / Signup

Using Information Flow Methods to Secure Cyber-Physical Systems.

Gerry Howser
Published in: Critical Infrastructure Protection (2015)
Keyphrases
  • information flow
  • computational intelligence
  • low cost
  • information sharing
  • communication networks
  • information flows