Richard Candell

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
While attacks on information systems have for most practical purposes binary outcomes (information was manipulated/eavesdropped, or not), attacks manipulating the sensor or control signals of Industrial Control Systems (ICS) can be tuned by the attacker to cause a continuous spectrum in damages. Attackers that want to remain undetected can attempt to hide(More)
  • 1