The Methodology for Hardening SCADA Security Using Countermeasure Ordering.
Sung-Hwan KimMin-Woo ParkJung-Ho EomTai-Myoung ChungPublished in: MUE (2013)
Keyphrases
- information security
- key management
- critical infrastructure
- cyber security
- security issues
- intrusion detection
- control system
- network security
- access control
- security requirements
- security systems
- security policies
- countermeasures
- information systems
- partial order
- smart grid
- computer security
- security mechanisms
- functional requirements
- numerical simulations
- real time
- security threats