Login / Signup
Analyzing vulnerabilities between SCADA system and SUC due to interdependencies.
Nan Cen
Irene Eusgeld
Wolfgang Kröger
Published in:
Reliab. Eng. Syst. Saf. (2013)
Keyphrases
</>
control system
information security
countermeasures
genetic algorithm
peer to peer
data collection
communication networks
key management