Author:
Shitharth S.,Satheesh N.,Kumar B. Praveen,Sangeetha K.
Reference39 articles.
1. Aghajanzadeh N, Keshavarz-Haddad A (2015) A concise model to evaluate security of SCADA systems based on security standards. Int J Comput Appl 111
2. Shahzad A et al (2015) A SCADA intermediate simulation platform to enhance the system security. In: 2015 17th international conference on advanced communication technology (ICACT), pp 368–373
3. Debashis De et al (2020) Wireless sensor network: applications, challenges, and algorithms, Springer tracts in nature-inspired. Springer, pp 1–18
4. Wei H et al (2015) SOM-based intrusion detection for SCADA systems. In: Electronics and electrical engineering: proceedings of the 2014 Asia-Pacific electronics and electrical engineering conference (EEEC 2014), 27–28 Dec 2014, Shanghai, China, p 57
5. Mcquillan JL, Lloyd CA (2016) SCADA intrusion detection systems. ed: US Patent 20,160,094,578
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献