|
Volumn 16, Issue 3, 2005, Pages 42-47
|
Security in SCADA how to handle the growing systems: Menace to process automation
|
Author keywords
[No Author keywords available]
|
Indexed keywords
AUTOMATION;
COMPUTER CRIME;
DIGITAL COMMUNICATION SYSTEMS;
INFORMATION TECHNOLOGY;
LEGACY SYSTEMS;
MICROPROCESSOR CHIPS;
PERSONAL COMPUTERS;
PROCESS CONTROL;
PROGRAM DOCUMENTATION;
PROGRAMMABLE LOGIC CONTROLLERS;
SECURITY SYSTEMS;
ETHERNET LAYER 3;
HACKERS;
PROCESS AUTOMATION;
VIRTUAL CONTROL PANEL;
SCADA SYSTEMS;
|
EID: 20844463674
PISSN: 09563385
EISSN: None
Source Type: Journal
DOI: 10.1049/cce:20050306 Document Type: Review |
Times cited : (20)
|
References (0)
|