2
by Putra, N.A., Punzalan, K.
Published 2016
...Non-Traditional Security in Asia: Issues, Challenges and Framework for Action...
Get full text
Others
4
by Nye, Joseph S.
Published 2012
Subjects: '; ...Cyber Security...
Get full text
Get full text
Journal Article
5
by Amini, Sajjad
Published 2017
Subjects: '; ...Cyber security, Destabilizing fault and attack, Detection, Location identification, Power system...
Get full text
etd
6
by Amin, Saurabh
Published 2011
Subjects: '; ...Attack diagnosis and response, Network security, Secure Control Systems...
Get full text
etd
12
by Gallaher, Michael P.
Published 2008
Subjects: '; ...Computer networks Security measures....
Book
13
by Augastine, Paul T.
Published 2007
Subjects: '; ...Computer security....
Book
14
Published 2013
Table of Contents: '; ...Cyber as Deterrent -- Cyber Security and Cyber Weapons: is Nonproliferation possible? -- Cyber...
Get full text
Electronic
15
by Lin, CW, Sangiovanni-Vincentelli, A
Published 2013
...We propose a security mechanism to help prevent cyber-attacks (masquerade and replay) in vehicles...
Get full text
article
16
by Lee, Eun Kyu
Published 2014
Subjects: '; ...communication, cyber physical system, interoperation, security, smart grid...
Get full text
etd
17
by Sakr, Yasser Shoukry
Published 2015
Subjects: '; ...Cyber Physical Systems, Privacy, Security...
Get full text
etd
19
by Wang, Q.-H., Kim, S.H.
Published 2013
Subjects: '; ...Cyber attacks...
Get full text
Conference Paper