Evaluation of security solutions in the SCADA environment.
Robert D. LarkinJuan Lopez Jr.Jonathan W. ButtsMichael R. GrimailaPublished in: Data Base (2014)
Keyphrases
- critical infrastructure
- key management
- control system
- optimal solution
- mobile robot
- access control
- cyber security
- information security
- real time
- security issues
- network security
- intrusion detection
- dynamic environments
- security patterns
- security analysis
- distributed multimedia
- risk analysis
- security requirements
- evaluation model
- virtual world
- computer systems
- low cost
- data analysis
- information systems