Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference49 articles.
1. Hurst W, Merabti M, Fergus P (2014) A survey of critical infrastructure security. In: Butts J, Shenoi S (eds) Critical infrastructure protection VIII. ICCIP 2014. IFIP Advances in information and communication technology, vol 441. Springer, Berlin
2. Yusufovna F, Alisherovich F, Choi M, Cho E, Abdurashidovich F, Kim T (2009) Research on critical infrastructures and critical information infrastructures. In: Proceedings of the symposium on bio-inspired learning and intelligent systems for security, pp 97–101
3. Hurst W, Merabti M, Fergus P (2013) Behavioral observation for critical infrastructure security support. In: Proceedings of the seventh IEEE European modeling symposium, pp 36–41
4. Wang C, Fang L, Dai Y (2010) A simulation environment for SCADA security analysis and assessment. In: Proceedings of the international conference on measuring technology and mechatronics automation, vol 1, pp 342–347
5. Walker J, Williams B, Skelton G (2010) Cyber security for emergency management. In: Proceedings of the IEEE international conference on technologies for homeland security, pp 476–480
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献