Login / Signup
A review of cyber security risk assessment methods for SCADA systems.
Yulia Cherdantseva
Pete Burnap
Andrew Blyth
Peter Eden
Kevin Jones
Hugh Soulsby
Kristan Stoddart
Published in:
Comput. Secur. (2016)
Keyphrases
</>
security risks
databases
control system
computer systems
supervisory control
real time
distributed systems
cyber security
critical infrastructure