Login / Signup
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation.
Seok Won Lee
Robin A. Gandhi
Gail-Joon Ahn
Published in:
ACM SIGSOFT Softw. Eng. Notes (2005)
Keyphrases
</>
critical infrastructure
business continuity
cyber security
risk analysis
data center
homeland security
cyber attacks
information security
context aware
databases
smart grid
web services
data acquisition
computational intelligence
control system
data analysis
intrusion detection
ubiquitous computing