Login / Signup
Investigating the security control of a water system: An overview.
Yu-Lun Huang
Ya-Hsuan Wang
Published in:
ASCC (2013)
Keyphrases
</>
control system
human operators
access control
security management
intrusion detection
statistical databases
information security
control method
data acquisition
real time
security policies
privacy preserving
security issues
adaptive control
low cost
encryption scheme
sensor networks
security vulnerabilities