Sign in
Vulnerability analysis and best practices for adopting IP telephony in critical infrastructure sectors.
Feng Cao
Saadat Malik
Published in:
IEEE Commun. Mag. (2006)
Keyphrases
</>
critical infrastructure
cyber security
cyber defense
cyber attacks
smart grid
control system
homeland security
risk analysis
information security
data acquisition
case study
access control
intrusion detection
software engineering
ip networks
security issues
social network analysis