Skip to main content

and
Your search also matched 4 preview-only Content is preview-only when you or your institution have not yet subscribed to it.

By making our abstracts and previews universally accessible we help you purchase only the content that is relevant to you.
results, e.g.

Adoption and Assessment of Machine Learning Algorithms in Security Operations Centre for Critical Infrastructure

Include preview-only content
  1. Article

    SCADA communication protocols: vulnerabilities, attacks and possible mitigations

    Current hierarchical SCADA systems uses communication protocols which aren’t having the inbuilt security mechanism. This lack of security mechanism will help attackers to sabotage the SCADA system. However, to...

    Durga Samanth Pidikiti, Rajesh Kalluri, R. K. Senthil Kumar in CSI Transactions on ICT (2013)