Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Security Encryption Schemes for Internet SCADA: Comparison of the Solutions

    SCADA has now expanded as it utilizes the Internet as communication line. SCADA communications can contain sensitive data, it is also a core component of a SCADA Monitoring System. SCADA (Supervisory Control a...

    Rosslin John Robles, Maricel Balitanas in Security-Enriched Urban Computing and Smar… (2011)

  2. No Access

    Chapter and Conference Paper

    Retrofit to CAIN Issues for Critical Infrastructures

    There is an increasing concern among both government officials and control systems experts about potential cyber threats to the control systems that govern critical infrastructures. The industrial control and ...

    Maricel O. Balitanas, Rosslin John Robles in Security-Enriched Urban Computing and Smar… (2011)