1 Hit in 11.6 sec

Information security for industrial applications

Christian Horn, Technische Universität Berlin, Technische Universität Berlin, Jörg Krüger, Jean-Pierre Seifert
This cyber infrastructure as a secondary infrastructure has reached a high degree of complexity and automation and the dependence of primary infrastructures on it is constantly growing.  ...  Attacks on these cyber infrastructures in security-critical areas such as Stuxnet or Duqu demonstrated the fundamental vulnerability of even encapsulated systems.  ...  FD wrlndD gFD nd glioneD eF @PHIRAF ryrid ontrol network intrusion detetion systems for utomted power distriution systemsF sn Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International  ... 
doi:10.14279/depositonce-8551 fatcat:zsbvvqdp6vai7l53xsfhxorvku