Search
Now showing items 1-1 of 1
Using detection in depth to counter SCADA-specific advanced persistent threats
(2014-04-01)
A heavy focus has recently been placed on the current state of each country’s critical
infrastructure security. Unfortunately, widely deployed supervisory control and data
acquisition (SCADA) protocols provide little ...