Sign in

Detecting Integrity Attacks on SCADA Systems.

Yilin MoRohan ChabukswarBruno Sinopoli
Published in: IEEE Trans. Control. Syst. Technol. (2014)
Keyphrases
  • network intrusion detection systems
  • intrusion prevention
  • computer systems
  • intrusion detection
  • complex systems
  • countermeasures
  • critical infrastructure