Security and protection of SCADA: a bigdata algorithmic approach

@inproceedings{Shyamasundar2013SecurityAP,
  title={Security and protection of SCADA: a bigdata algorithmic approach},
  author={R. K. Shyamasundar},
  booktitle={SIN},
  year={2013}
}
Due to technological advances, it has been a common practice for quite some time to use embedded computers for the monitoring and control of physical processes/plants. These are essentially networked computer-based systems consisting of application-specific control-processing systems, actuators, sensors etc., used for digitally controlling physical systems (often in a federated manner) within a defined geographical location such as power plants, chemical plants etc. Different terminologies like… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-2 of 2 references

Computer viruses: from theory to applications

  • Eric Filiol
  • First edition, IRIS International Series…
  • 2005
Highly Influential
3 Excerpts

Similar Papers

Loading similar papers…