Login / Signup
Identifying SCADA vulnerabilities using passive and active vulnerability assessment techniques.
Sagar Samtani
Shuo Yu
Hongyi Zhu
Mark W. Patton
Hsinchun Chen
Published in:
ISI (2016)
Keyphrases
</>
security vulnerabilities
risk assessment
buffer overflow
control system
attack graphs
security risks
information security
denial of service
assessment process
supervisory control
data processing
computer systems
intrusion detection
simulation model
risk management
key management