Insecure by Design: Using Human Interface Devices to exploit SCADA systems.
Grigoris TzokatziouLeandros A. MaglarasHelge JanickePublished in: ICS-CSR (2015)
Keyphrases
- human computer interface
- user interface
- operating environment
- building blocks
- embedded systems
- human factors
- human machine interface
- human machine
- case study
- knowledge based systems
- design process
- design criteria
- intelligent user interfaces
- computer interface
- single user
- processing capabilities
- design tools
- design issues
- user experience
- mobile devices
- real time