Use of a non-peer reviewed sources in cyber-security scientific research.
Dalibor GernhardtStjepan GrosPublished in: CoRR (2021)
Keyphrases
- cyber security
- smart grid
- intrusion detection
- cyber attacks
- senior citizens
- security issues
- intrusion detection system
- network security
- security and privacy issues
- critical infrastructure
- telecommunication systems
- security breaches
- information systems
- power system
- communication networks
- data sources
- data mining
- databases
- visual analytics
- countermeasures
- scientific data
- information security
- knowledge discovery