Login / Signup

A method for evaluating the consequence propagation of security attacks in cyber-physical systems.

Hamed OrojlooMohammad Abdollahi Azgomi
Published in: Future Gener. Comput. Syst. (2017)
Keyphrases
  • real time
  • information systems
  • security policies