Login / Signup
A method for evaluating the consequence propagation of security attacks in cyber-physical systems.
Hamed Orojloo
Mohammad Abdollahi Azgomi
Published in:
Future Gener. Comput. Syst. (2017)
Keyphrases
</>
real time
information systems
security policies