SCADA and Control System Security: New Standards Protecting Old Technology.
Scott HowardPublished in: ISSE (2010)
Keyphrases
- control system
- critical infrastructure
- access control
- remote control
- fuzzy logic
- cyber security
- closed loop
- data encryption
- key management
- control center
- protection mechanisms
- open standards
- real time
- remote monitoring
- control strategy
- data processing
- case study
- key technologies
- information security
- virtual instrument
- control algorithm
- control architecture
- smart grid
- security issues
- statistical databases
- digital rights management
- inference control
- control law