Sign in
Blockchain Patterns in Critical Infrastructures: Limitations and Recommendations.
Hind Bangui
Barbora Buhnova
Published in:
ICSOFT (2022)
Keyphrases
</>
critical infrastructure
critical information
data mining techniques
homeland security
cyber security
high priority
control system
long term
data processing
cyber attacks
malicious code detection