|
Volumn , Issue , 2011, Pages 130-136
|
Myth or reality - Does the Aurora vulnerability pose a risk to my generator?
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CRITICAL ASSET;
ELECTRIC POWER GENERATORS;
INFORMATION PROTECTION;
KEY INDICATOR;
MALICIOUS ATTACK;
MITIGATION TECHNIQUES;
PHYSICAL SECURITY;
POSITIVE CHANGES;
RISK FACTORS;
STANDARD PRACTICES;
ELECTRIC EQUIPMENT PROTECTION;
ELECTRIC GENERATORS;
ELECTRIC POWER SYSTEMS;
ENGINEERS;
NETWORK SECURITY;
PERSONAL COMPUTING;
RELAY PROTECTION;
RISK ASSESSMENT;
|
EID: 80055005133
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/CPRE.2011.6035612 Document Type: Conference Paper |
Times cited : (95)
|
References (8)
|