Run-time prediction and preemption of configuration attacks on embedded process controllers
Proceedings of the First International Conference on Security of Internet of Things
Communications of the ACM
Evaluation of security solutions in the SCADA environment
ACM SIGMIS Database
Hi-index | 0.02 |
In recent years, the press has been banging the drums about the prospects of cyber warfare between nations. It makes a good story. In the imagined scenario, national governments are gathering and training elite teams of computer hackers prepared to infiltrate or take down the computer network of an enemy nation. Every nation has the weapons 驴 computers and software 驴 to be a major threat without having to be a superpower. Any David can take on a Goliath, and in fact the most industrialized countries might be the most network- dependent and vulnerable.