Vulnerability of industrial facilities to attacks with improvised explosive devices aimed at triggering domino scenarios.
Gabriele LanducciGenserik ReniersValerio CozzaniErnesto SalzanoPublished in: Reliab. Eng. Syst. Saf. (2015)
Keyphrases
- buffer overflow
- security risks
- mobile devices
- security vulnerabilities
- countermeasures
- attack graphs
- attack scenarios
- industrial applications
- traffic analysis
- real world
- watermarking scheme
- embedded systems
- computer security
- security threats
- technology transfer
- watermarking technique
- industrial processes
- malicious attacks
- denial of service