Login / Signup
Protecting Critical Infrastructures from Stealth Attacks: A Closed-Loop Approach Involving Detection and Remediation - (Short Paper).
Stefano Avallone
Claudio Mazzariello
Francesco Oliviero
Simon Pietro Romano
Published in:
CRITIS (2011)
Keyphrases
</>
closed loop
control system
critical infrastructure
open loop
cyber attacks
control scheme
control law
parameter identification
feedback control
insider threat
countermeasures
homeland security
cyber security
smart grid
information security
privacy issues
decision making
anomaly detection
expert systems