Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Security Encryption Schemes for Internet SCADA: Comparison of the Solutions
SCADA has now expanded as it utilizes the Internet as communication line. SCADA communications can contain sensitive data, it is also a core component of a SCADA Monitoring System. SCADA (Supervisory Control a...
-
Chapter and Conference Paper
Retrofit to CAIN Issues for Critical Infrastructures
There is an increasing concern among both government officials and control systems experts about potential cyber threats to the control systems that govern critical infrastructures. The industrial control and ...