z-logo
open-access-imgOpen Access
Consequences of possible cyberattacks on objects of the critical infrastructure
Author(s) -
Serhii Honchar,
Hennadii Leonenko
Publication year - 2016
Publication title -
information technology and security
Language(s) - English
Resource type - Journals
eISSN - 2518-1033
pISSN - 2411-1031
DOI - 10.20535/2411-1031.2016.4.1.96101
Subject(s) - critical infrastructure , computer security , process (computing) , control (management) , object (grammar) , computer science , industrial control system , scada , state (computer science) , information system , business , risk analysis (engineering) , engineering , artificial intelligence , algorithm , electrical engineering , operating system

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here