Login / Signup

False sequential logic attack on SCADA system and its physical impact analysis.

Weize LiLun XieZulan DengZhiliang Wang
Published in: Comput. Secur. (2016)
Keyphrases
  • impact analysis
  • dependency analysis
  • source code
  • change impact analysis
  • software development
  • life cycle
  • secret key
  • data processing