1. A simulation environment for SCADA security analysis and assessment;Wang,2010
2. Research on critical infrastructures and critical information infrastructures;Yusufovna,2009
3. Analyzing the vulnerability of critical infrastructure to attack and planning defenses;Brown,2005
4. Security that matters: Critical infrastructure and objects of protection;Aradau;Secur. Dialogue,2010
5. A discriminative spatio-temporal mapping of face for liveness detection;Lakshminarayana,2017