Author:
Yılmaz Ercan Nurcan,Gönen Serkan
Subject
Law,General Computer Science
Reference26 articles.
1. Performance evaluation study of intrusion detection systems;Alhomoud;Proc Comput Sci,2011
2. Designing secure networks for process control;Byres;IEEE Ind Applic Mag,2000
3. On shaky ground—a study of security vulnerabilities in control protocols;Byres,2006
4. A multidimensional critical state analysis for detecting intrusions in SCADA systems;Carcano;IEEE Trans Ind Informatics,2011
5. Cyber-security considerations for the smart grid;Clements,2010
Cited by
58 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献