Login / Signup

Analyzing vulnerabilities between SCADA system and SUC due to interdependencies.

Nan CenIrene EusgeldWolfgang Kröger
Published in: Reliab. Eng. Syst. Saf. (2013)
Keyphrases
  • control system
  • information security
  • countermeasures
  • genetic algorithm
  • peer to peer
  • data collection
  • communication networks
  • key management