Sign in

Blockchain Patterns in Critical Infrastructures: Limitations and Recommendations.

Hind BanguiBarbora Buhnova
Published in: ICSOFT (2022)
Keyphrases
  • critical infrastructure
  • critical information
  • data mining techniques
  • homeland security
  • cyber security
  • high priority
  • control system
  • long term
  • data processing
  • cyber attacks
  • malicious code detection