A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
This cyber infrastructure as a secondary infrastructure has reached a high degree of complexity and automation and the dependence of primary infrastructures on it is constantly growing. ... Attacks on these cyber infrastructures in security-critical areas such as Stuxnet or Duqu demonstrated the fundamental vulnerability of even encapsulated systems. ... FD wrlndD gFD nd glioneD eF @PHIRAF ryrid ontrol network intrusion detetion systems for utomted power distriution systemsF sn Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International ...doi:10.14279/depositonce-8551 fatcat:zsbvvqdp6vai7l53xsfhxorvku