Case Studies of SCADA Firewall Configurations and the Implications for Best Practices.
Dinesha RanathungaMatthew RoughanHung X. NguyenPhil KernickNickolas J. G. FalknerPublished in: IEEE Trans. Netw. Serv. Manag. (2016)
Keyphrases
- case study
- intrusion detection system
- intrusion detection
- control system
- open source
- lessons learned
- real world
- network security
- key management
- network traffic
- supervisory control
- cyber security
- software development
- data mining
- knowledge management
- literature review
- neural network
- critical infrastructure
- security risks
- computer systems
- genetic algorithm
- leading edge
- real time