Sign in

Towards a Threat Modeling Approach Addressing Security and Safety in OT Environments.

Siegfried HollererWolfgang KastnerThilo Sauter
Published in: WFCS (2021)
Keyphrases
  • security policies
  • network security
  • security requirements
  • dynamic environments
  • security analysis
  • neural network
  • wireless sensor networks
  • intrusion detection
  • functional requirements