A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Filters
Information security for industrial applications
2019
This cyber infrastructure as a secondary infrastructure has reached a high degree of complexity and automation and the dependence of primary infrastructures on it is constantly growing. ...
Attacks on these cyber infrastructures in security-critical areas such as Stuxnet or Duqu demonstrated the fundamental vulnerability of even encapsulated systems. ...
FD wrlndD gFD nd glioneD eF @PHIRAF ryrid ontrol network intrusion detetion systems for utomted power distriution systemsF sn Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International ...
doi:10.14279/depositonce-8551
fatcat:zsbvvqdp6vai7l53xsfhxorvku