
SCADA Security
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems
Cyber-attacks on SCADA systemsthe control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory managementcan lead to costly financial consequences or even result in loss of life. Min...
Examines the design and use of Intrusion Detection Systems (IDS) to secure Supervisory Control and Data Acquisition (SCADA) systems
Cyber-attacks on SCADA systemsthe control system architecture that uses computers, networked data communications, and graphical user interfaces for high-level process supervisory managementcan lead to costly financial consequences or even result in loss of life. Min...