Skip to Main Content
Keywords: Cyber attacks
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2019) 27 (1): 47–61.
Published: 07 February 2019
... and their underlying architecture must be protected to withstand cyber-attacks. This study aims to review several ICS security assessment methodologies to identify an appropriate vulnerability assessment method for the ICS systems that examine both critical physical and cyber systems so as to protect the national...

or Create an Account

Close Modal
Close Modal