Convergence of IT and SCADA: Associated Security Threats and Vulnerabilities.
Michael SmurthwaiteMaumita BhattacharyaPublished in: CoRR (2020)
Keyphrases
- security threats
- key management
- security issues
- security risks
- security mechanisms
- cyber security
- information security
- resource constrained
- ad hoc networks
- control system
- wireless sensor networks
- security requirements
- access control
- cloud computing
- data sets
- sensitive data
- data access
- critical infrastructure
- smart card
- real time
- security measures