A Methodology and Toolkit for Deploying Reliable Security Policies in Critical Infrastructures.
Faouzi JaïdiFaten Labbene AyachiAdel BouhoulaPublished in: Secur. Commun. Networks (2018)
Keyphrases
- security policies
- cyber attacks
- critical infrastructure
- access control
- network security
- information security
- distributed systems
- cyber security
- security requirements
- access control systems
- network management
- smart grid
- homeland security
- power grid
- decision making
- power system
- intrusion detection
- critical information
- telecommunication systems
- countermeasures
- computer networks
- computer systems
- control system