Login / Signup

A review of cyber security risk assessment methods for SCADA systems.

Yulia CherdantsevaPete BurnapAndrew BlythPeter EdenKevin JonesHugh SoulsbyKristan Stoddart
Published in: Comput. Secur. (2016)
Keyphrases
  • security risks
  • databases
  • control system
  • computer systems
  • supervisory control
  • real time
  • distributed systems
  • cyber security
  • critical infrastructure