Cyber security and protection of ICS systems: an Australian example

Warren, Matthew J. and Leitch, Shona 2015, Cyber security and protection of ICS systems: an Australian example. In Lehto, Martti and Neittaanmäki, Pekka (ed), Cyber security : analytics, technology and automation, Springer, Berlin, Germany, pp.215-228, doi: 10.1007/978-3-319-18302-2_14.

Attached Files
Name Description MIMEType Size Downloads

Title Cyber security and protection of ICS systems: an Australian example
Author(s) Warren, Matthew J.
Leitch, Shona
Title of book Cyber security : analytics, technology and automation
Editor(s) Lehto, Martti
Neittaanmäki, Pekka
Publication date 2015
Series Intelligent systems, control and automation : science and engineering; v.78
Chapter number 14
Total chapters 16
Start page 215
End page 228
Total pages 14
Publisher Springer
Place of Publication Berlin, Germany
ISBN 9783319183022
3319183028
ISSN 2213-8986
2213-8994
Language eng
DOI 10.1007/978-3-319-18302-2_14
Field of Research 080609 Information Systems Management
Socio Economic Objective 899999 Information and Communication Services not elsewhere classified
HERDC Research category B1 Book chapter
Copyright notice ©2015, Springer
Persistent URL http://hdl.handle.net/10536/DRO/DU:30077447

Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Versions
Version Filter Type
Citation counts: TR Web of Science Citation Count  Cited 0 times in TR Web of Science
Scopus Citation Count Cited 2 times in Scopus
Google Scholar Search Google Scholar
Access Statistics: 281 Abstract Views, 15 File Downloads  -  Detailed Statistics
Created: Mon, 31 Aug 2015, 11:39:39 EST

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.