|
Volumn 6983 LNCS, Issue , 2013, Pages 209-212
|
Protecting critical infrastructures from stealth attacks: A closed-loop approach involving detection and remediation (short paper)
|
Author keywords
Critical Infrastructure Protection; Denial of Service (DoS); Intrusion Detection; Remediation
|
Indexed keywords
BRUTE-FORCE ATTACK;
CLOSED-LOOP;
CRITICAL INFRASTRUCTURE PROTECTION;
DENIAL OF SERVICE;
DENIAL OF SERVICE ATTACKS;
EUROPEAN PROJECT;
NETWORK THREATS;
STEALTH ATTACKS;
INTRUSION DETECTION;
PUBLIC WORKS;
REMEDIATION;
TELECOMMUNICATION NETWORKS;
TRANSMISSION CONTROL PROTOCOL;
CRITICAL INFRASTRUCTURES;
|
EID: 84885725221
PISSN: 03029743
EISSN: 16113349
Source Type: Book Series
DOI: 10.1007/978-3-642-41476-3_19 Document Type: Conference Paper |
Times cited : (1)
|
References (3)
|