Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
15 | Si-Jung Kim, Do-Eun Cho, Sang-Soo Yeo |
Secure Model against APT in m-Connected SCADA Network. |
Int. J. Distributed Sens. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Antonio Di Pietro, Stefano Panzieri |
Taxonomy of SCADA systems security testbeds. |
Int. J. Crit. Infrastructures |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Adil Fahad, Zahir Tari, Abdulmohsen Almalawi, Andrzej Goscinski, Ibrahim Khalil, Abdun Naser Mahmood |
PPFSCADA: Privacy preserving framework for SCADA data publishing. |
Future Gener. Comput. Syst. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Jingcheng Gao, Jing Liu 0027, Bharat Rajan, Rahul Nori, Bo Fu, Yang Xiao 0001, Wei Liang 0001, C. L. Philip Chen |
SCADA communication and security issues. |
Secur. Commun. Networks |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Amit Kleinmann, Avishai Wool |
Accurate Modeling of The Siemens S7 SCADA Protocol For Intrusion Detection And Digital Forensic. |
J. Digit. Forensics Secur. Law |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Abdulmohsen Almalawi, Xinghuo Yu 0001, Zahir Tari, Adil Fahad, Ibrahim Khalil |
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems. |
Comput. Secur. |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Petr Novák, Radek Sindelár, Richard Mordinyi |
Integration framework for simulations and SCADA systems. |
Simul. Model. Pract. Theory |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Nabil Sahli, Mohamed Benmohammed, El-Bay Bourennane |
Ontology and protocol secure for SCADA. |
Int. J. Metadata Semant. Ontologies |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Robert D. Larkin, Juan Lopez Jr., Jonathan W. Butts, Michael R. Grimaila |
Evaluation of security solutions in the SCADA environment. |
Data Base |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Igor Nai Fovino |
SCADA System Cyber Security. |
Secure Smart Embedded Devices, Platforms and Applications |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yuki Matsui, Hideharu Kojima, Tatsuhiro Tsuchiya |
Modeling the Interaction of Power Line and SCADA Networks. |
HASE |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Ester Ciancamerla, B. Fresilli, Michele Minichino, Tatiana Patriarca, Serguei Iassinovski |
An electrical grid and its SCADA under cyber attacks: Modelling versus a Hybrid Test Bed. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Alessio Antonini, Alessandro Barenghi, Gerardo Pelosi, Saman A. Zonouz |
Security challenges in building automation and SCADA. |
ICCST |
2014 |
DBLP DOI BibTeX RDF |
|
15 | William Mahoney, Abhishek Parakh, Matthew Battey |
Hardware Implementation of Quasigroup Encryption for SCADA Networks. |
NCA |
2014 |
DBLP DOI BibTeX RDF |
|
15 | I. Stoian, S. Ignat, D. Capatina, O. Ghiran |
Security and intrusion detection on critical SCADA systems for water management. |
AQTR |
2014 |
DBLP DOI BibTeX RDF |
|
15 | I. Stoian, D. Capatina, S. Ignat, O. Ghiran |
SCADA and modeling in water management. |
AQTR |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Adrian Korodi, Ioan Silea |
Specifying and tendering of automation and SCADA systems: Case study for waste water treatment plants. |
CCA |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Van Long Do, Lionel Fillatre, Igor V. Nikiforov |
A statistical method for detecting cyber/physical attacks on SCADA systems. |
CCA |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Hui Lin 0005, Adam J. Slagell, Zbigniew T. Kalbarczyk, Ravishankar K. Iyer |
Semantic Security Analysis of SCADA Networks to Detect Malicious Control Commands in Power Grids (Poster). |
SIN |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Suhaila Ismail, Elena Sitnikova, Jill Slay |
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Deepjyoti Deka, Ross Baldick, Sriram Vishwanath |
Optimal hidden SCADA attacks on power grid: A graph theoretic approach. |
ICNC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Rami Al-Dalky, Omar Abduljaleel, Khaled Salah 0001, Hadi Otrok, Mahmoud Al-Qutayri |
A Modbus traffic generator for evaluating the security of SCADA systems. |
CSNDSP |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yanjun Zuo |
Data labeling for integrity in SCADA systems. |
ICIS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Weize Li 0002, Lun Xie, Daqian Liu, Zhiliang Wang |
False Logic Attacks on SCADA Control System. |
APSCC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Said Filali, Carina S. González, Carlos Lecuona |
Standards Evaluation HMI: Application of the guideline GEDIS to the systems SCADA of the NAP (Network Access Point) Canary Islands. |
Interacción |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Simon Back, Simon B. Kranzer, Thomas J. Heistracher, Thomas J. Lampoltshammer |
Bridging SCADA systems and GI systems. |
WF-IoT |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sai Krishna Pallimalli, Arshad Shaik |
Defense Methodologies of AV Evasion for Access Control and Information Assurance in Industrial Distributed Control Systems and SCADA Systems. |
ICITCS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Dong-Ho Kang, Byoung-Koo Kim, Jung-Chan Na, Kyoung-Son Jhang |
Whitelist Generation Technique for Industrial Firewall in SCADA Networks. |
FCC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Vlad-Cristian Georgescu |
SCADA software used in dispatch centre for photovoltaic parks. |
ECAI |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Amritha Puliadi Premnath, Ju-Yeon Jo, Yoohwan Kim |
Application of NTRU Cryptographic Algorithm for SCADA Security. |
ITNG |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Christophe Feltus, Moussa Ouedraogo, Djamel Khadraoui |
Towards cyber-security protection of critical infrastructures by generating security policy for SCADA systems. |
ICT-DM |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Sylvie Charbonnier, Nabil Bouchair, Philippe Gayet |
Analysis of fault diagnosability from SCADA alarms signatures using relevance indices. |
SMC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Jie Wen 0007, Jiao Dai, Jizhong Han, Fangchun Di, Hu Yan |
Llama: Distributed Multi-versioned Model Data Management for SCADA. |
CSE |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Waseem Anwar, Farooque Azam |
Proposing a Novel Architecture of Script Component to Incorporate the Scripting Language Support in SCADA Systems. |
CISIM |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Kyoung-Ho Kim, Jeong-Han Yun, Yeop Chang, Woonyon Kim |
Packet Loss Consideration for Burst-Based Anomaly Detection in SCADA Network. |
WISA |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Seungoh Choi, Yeop Chang, Jeong-Han Yun, Woonyon Kim |
Multivariate Statistic Approach to Field Specifications of Binary Protocols in SCADA System. |
WISA |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Adnan A. Farooqui, Syed Sajjad Haider Zaidi, Attaullah Y. Memon, Sameer Qazi |
Cyber Security Backdrop: A SCADA testbed. |
ComComAP |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Irina N. Kolosok, Liudmila Gurina |
Calculation of Cyber Security Index in the Problem of Power System State Estimation Based on SCADA and WAMS Measurements. |
CRITIS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Leandros A. Maglaras, Jianmin Jiang |
OCSVM model combined with K-means recursive clustering for intrusion detection in SCADA systems. |
QSHINE |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Helge Janicke, Kevin I. Jones (eds.) |
2nd International Symposium for ICS & SCADA Cyber Security Research 2014, ICS-CSR 2014, 11-12 September 2014, St. Pölten, Austria |
ICS-CSR |
2014 |
DBLP BibTeX RDF |
|
15 | Chen Liu 0011, Mengxin Liu, Zhengqiu Yang, Jiangpeng Xiu |
Study on the data integration platform of multi-regional SCADA system based on cloud computing. |
CCIS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yong Qin, Xiedong Cao, Peng Liang 0007, Qichao Hu, Weiwei Zhang |
Research on the analytic factor neuron model based on cloud generator and its application in oil&gas SCADA security defense. |
CCIS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Aamir 0001, Muhammad Aslam Uqaili, Javier Poncela, Nishat Ahmad Khan, B. S. Chowdhry 0001 |
Implementation and testing of optimal design of RTU hardware for Wireless SCADA. |
VITAE |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yang Hu 0009, Jizhen Liu, Taihua Chang, Wei Li 0100, Zhongwei Lin, Hongmin Meng |
Effective wind speed estimation and optimized setting strategy for WTGS based on SCADA system. |
AuCC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Suhaila Ismail, Elena Sitnikova, Jill Slay |
Using integrated system theory approach to assess security for SCADA systems cyber security for critical infrastructures: A pilot study. |
FSKD |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Payam Mahmoudi Nasr, Ali Yazdian Varjani |
Petri net model of insider attacks in SCADA system. |
ISCISC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Aamir Shahzad, Shahrulniza Musa, Abdulaziz Aborujilah, Muhammad Irfan |
Industrial control systems (ICSs) vulnerabilities analysis and SCADA security enhancement using testbed encryption. |
ICUIMC |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Qian Chen 0019, Sherif Abdelwahed |
Towards realizing self-protecting SCADA systems. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Anis Ben Aissa, Latifa Ben Arfa Rabai, Robert K. Abercrombie, Ali Mili 0001, Frederick T. Sheldon |
Quantifying availability in SCADA environments using the cyber security metric MFC. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Michael Haney, Mauricio Papa |
A framework for the design and deployment of a SCADA honeynet. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Rattikorn Hewett, Sudeeptha Rudrapattana, Phongphun Kijsanayothin |
Cyber-security analysis of smart grid SCADA systems with game models. |
CISR |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Yong Wang, Zhaoyan Xu, Jialong Zhang, Lei Xu 0024, Haopei Wang, Guofei Gu |
SRID: State Relation Based Intrusion Detection for False Data Injection Attacks in SCADA. |
ESORICS (2) |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Nunzio Marco Torrisi, Ognjen Vukovic, György Dán, Stefan Hagdahl |
Peekaboo: A gray hole attack on encrypted SCADA communication using traffic analysis. |
SmartGridComm |
2014 |
DBLP DOI BibTeX RDF |
|
15 | J. Jerry Daniel, H. Pratheesh, B. Raja Singh, G. Rakesh, Joseph Mathew, Senju Thomas Panicker, S. S. Shankar, K. T. Sujimon, Arun Krishnan, A. Muhammed Irshad |
Implementation of a novel SCADA architecture for a 210 MW thermal power plant. |
ICDSE |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Valery Anatolevich Kamaev, Alexey G. Finogeev, Anton A. Finogeev, Sergey Shevchenko |
Knowledge Discovery in the SCADA Databases Used for the Municipal Power Supply System. |
JCKBSE |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Shahir Majed, Suhaimi Ibrahim, Mohamed Shaaban |
Architecting and Development of the SecureCyber: A SCADA Security platform Over Energy Smart Grid. |
iiWAS |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Qian Chen 0019, Sherif Abdelwahed |
A Model-based Approach to Self-Protection in SCADA Systems. |
Feedback Computing |
2014 |
DBLP BibTeX RDF |
|
15 | Nicole Beatriz Portilla, Max Hering de Queiroz, José Eduardo Ribeiro Cury |
Integration of supervisory control with SCADA system for a flexible manufacturing cell. |
INDIN |
2014 |
DBLP DOI BibTeX RDF |
|
15 | Manuel Cheminod, Luca Durante, Lucia Seno, Adriano Valenzano |
Automated Analysis of Access Policies in Industrial Plants. |
ICS-CSR |
2014 |
DBLP BibTeX RDF |
|
15 | Laurens Lemaire, Jorn Lapon, Bart De Decker, Vincent Naessens |
A SysML Extension for Security Analysis of Industrial Control Systems. |
ICS-CSR |
2014 |
DBLP BibTeX RDF |
|
15 | Alessio Antonini, Federico Maggi, Stefano Zanero |
A Practical Attack Against a KNX-based Building Automation System. |
ICS-CSR |
2014 |
DBLP BibTeX RDF |
|
15 | Benjamin Green 0001, Daniel Prince, Utz Roedig, Jerry S. Busby, David Hutchison 0001 |
Socio-Technical Security Analysis of Industrial Control Systems (ICS). |
ICS-CSR |
2014 |
DBLP BibTeX RDF |
|
15 | Kieran McLaughlin, Sakir Sezer, Paul Smith 0001, Zhendong Ma, Florian Skopik |
PRECYSE: Cyber-attack Detection and Response for Industrial Control Systems. |
ICS-CSR |
2014 |
DBLP BibTeX RDF |
|
15 | Robin Chapas, Ana Hristova, Thomas Locher, Sebastian Obermeier 0001 |
Securing Industrial Control Systems through Autonomous Hardening. |
ICS-CSR |
2014 |
DBLP BibTeX RDF |
|
15 | Donghyun Choi, Hanjae Jeong, Dongho Won, Seungjoo Kim |
Hybrid Key Management Architecture for Robust SCADA Systems. |
J. Inf. Sci. Eng. |
2013 |
DBLP BibTeX RDF |
|
15 | Carlos Queiroz, Abdun Naser Mahmood, Zahir Tari |
A Probabilistic Model to Predict the Survivability of SCADA Systems. |
IEEE Trans. Ind. Informatics |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Nan Cen, Irene Eusgeld, Wolfgang Kröger |
Analyzing vulnerabilities between SCADA system and SUC due to interdependencies. |
Reliab. Eng. Syst. Saf. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Niv Goldenberg, Avishai Wool |
Accurate modeling of Modbus/TCP for intrusion detection in SCADA systems. |
Int. J. Crit. Infrastructure Prot. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jeffrey L. Hieb, Jacob Schreiver, James H. Graham |
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices. |
Int. J. Crit. Infrastructure Prot. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Rafael Ramos Regis Barbosa, Ramin Sadre, Aiko Pras |
Flow whitelisting in SCADA networks. |
Int. J. Crit. Infrastructure Prot. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Saurabh Amin, Xavier Litrico, S. Shankar Sastry, Alexandre M. Bayen |
Cyber Security of Water SCADA Systems - Part II: Attack Detection Using Enhanced Hydrodynamic Models. |
IEEE Trans. Control. Syst. Technol. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Saurabh Amin, Xavier Litrico, Shankar Sastry 0001, Alexandre M. Bayen |
Cyber Security of Water SCADA Systems - Part I: Analysis and Experimentation of Stealthy Deception Attacks. |
IEEE Trans. Control. Syst. Technol. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Hussam M. N. Al Hamadi, Chan Yeob Yeun, Mohamed Jamal Zemerly |
A Novel Security Scheme for the Smart Grid and SCADA Networks. |
Wirel. Pers. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Muhammad Aamir 0001, Javier Poncela, Muhammad Aslam Uqaili, Bhawani Shankar Chowdhry, Nishat Ahmad Khan |
Optimal Design of Remote Terminal Unit (RTU) for Wireless SCADA System for Energy Management. |
Wirel. Pers. Commun. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Meik Schlechtingen, Ilmar Ferreira Santos, Sofiane Achiche |
Wind turbine condition monitoring based on SCADA data using normal behavior models. Part 1: System description. |
Appl. Soft Comput. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Savas Sahin, Yalçin Isler |
Microcontroller-Based Robotics and SCADA Experiments. |
IEEE Trans. Educ. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Thomas Richard McEvoy, Stephen D. Wolthusen |
Locating subverted processes using random packet comparison in SCADA systems. |
Int. J. Crit. Infrastructures |
2013 |
DBLP DOI BibTeX RDF |
|
15 | John McCarthy 0004, William Mahoney |
SCADA Threats in the Modern Airport. |
Int. J. Cyber Warf. Terror. |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Eric Byres |
The air gap: SCADA's enduring security myth. |
Commun. ACM |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Diogo L. F. Nina, João Viana da Fonseca Neto, Ernesto Franklin Marcal Ferreira, Alcione Miranda dos Santos |
Hybrid Support System for Decision Making Based on MLP-ANN, IED and SCADA for Disturbances Analysis of Electrical Power Distribution Transformers. |
UKSim |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Hui Lin 0005, Adam J. Slagell, Zbigniew Kalbarczyk, Peter W. Sauer, Ravishankar K. Iyer |
Semantic security analysis of SCADA networks to detect malicious control commands in power grids. |
SEGS@CCS |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Yi Deng 0005, Sandeep K. Shukla |
A Distributed Real-Time Event Correlation Architecture for SCADA Security. |
Critical Infrastructure Protection |
2013 |
DBLP DOI BibTeX RDF |
|
15 | R. K. Shyamasundar |
Security and protection of SCADA: a bigdata algorithmic approach. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Christophe Feltus, Djamel Khadraoui |
On designing automatic reaction strategy for critical infrastructure SCADA system. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Guy Guemkam, Jonathan Blangenois, Christophe Feltus, Djamel Khadraoui |
Metamodel for reputation based agents system: case study for electrical distribution SCADA design. |
SIN |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Miao Liu, Changbing Guo, Mancang Yuan |
The Framework of SCADA System Based on Cloud Computing. |
CloudComp |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Justin M. Beaver, Raymond C. Borges-Hink, Mark A. Buckner |
An Evaluation of Machine Learning Methods to Detect Malicious SCADA Communications. |
ICMLA (2) |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jian Shen 0001, Jin Wang 0001, Yongjun Ren, Jianwei Zhang 0005, Shunfeng Wang |
Efficient Key Management Scheme for SCADA System. |
EMC/HumanCom |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ondrej Rysavý, Jaroslav Ráb, Miroslav Svéda |
Improving security in SCADA systems through firewall policy analysis. |
FedCSIS |
2013 |
DBLP BibTeX RDF |
|
15 | Wojciech Tylman |
SCADA Intrusion Detection Based on Modelling of Allowed Communication Patterns. |
DepCoS-RELCOMEX |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Ester Ciancamerla, Michele Minichino, S. Palmieri |
Modelling SCADA and Corporate Network of a Medium Voltage Power Grid under Cyber Attacks. |
SECRYPT |
2013 |
DBLP BibTeX RDF |
|
15 | Dawei Su, Chunlei Xu, Haibing Zhu, Mingyang Sun, Weijin Zhuang, Yonggang Zhang |
Design and Realization of Clustering Based Power Grid SCADA System. |
Asia International Conference on Modelling and Simulation |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Elena Sitnikova, Ernest Foo, Rayford B. Vaughn |
The Power of Hands-On Exercises in SCADA Cyber Security Education. |
World Conference on Information Security Education |
2013 |
DBLP DOI BibTeX RDF |
|
15 | John T. Hagen, Barry E. Mullins |
TCP veto: A novel network attack and its Application to SCADA protocols. |
ISGT |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Rong Jiang 0001, Rongxing Lu, Chengzhe Lai, Jun Luo 0011, Xuemin Shen |
Robust group key management with revocation and collusion resistance for SCADA in smart grid. |
GLOBECOM |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Si-Jung Kim, Bong-Han Kim, Sang-Soo Yeo, Do-Eun Cho |
Network Anomaly Detection for M-Connected SCADA Networks. |
BWCCA |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Jules Pagna Disso, Kevin Jones, Steven Bailey |
A Plausible Solution to SCADA Security Honeypot Systems. |
BWCCA |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Gilberto Schneider, Vanessa F. de Lima, Lucas G. Scherer, Robinson F. de Camargo, Claiton M. Franchi |
SCADA system applied to micro hydropower plant. |
IECON |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Naoum Sayegh, Ali Chehab, Imad H. Elhajj, Ayman I. Kayssi |
Internal security attacks on SCADA systems. |
ICCIT |
2013 |
DBLP DOI BibTeX RDF |
|
15 | Djamel Khadraoui, Christophe Feltus |
Critical Infrastructures Governance Exploring SCADA Cybernetics through Architectured Policy Semantic. |
SMC |
2013 |
DBLP DOI BibTeX RDF |
|