Protecting world water supplies against backflow attacks

被引:0
|
作者
Kroll, Dan
机构
来源
Water and Wastewater International | 2010年 / 25卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
(Edited Abstract)
引用
收藏
相关论文
共 50 条
  • [41] In over our heads? Questions on protecting US water supplies
    1600, American Water Works Association (94):
  • [42] Protecting water and wastewater infrastructure from cyber attacks
    Srinivas Panguluri
    William Phillips
    John Cusimano
    Frontiers of Earth Science, 2011, 5 : 406 - 413
  • [43] Protecting water and wastewater infrastructure from cyber attacks
    Panguluri, Srinivas
    Phillips, William
    Cusimano, John
    FRONTIERS OF EARTH SCIENCE, 2011, 5 (04) : 406 - 413
  • [44] On protecting industrial automation and control systems against electronic attacks
    Wei, Dong
    Jafari, Mohsen
    Lu, Yan
    2007 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION SCIENCE AND ENGINEERING, VOLS 1-3, 2007, : 691 - 696
  • [45] Protecting Dynamic Mobile Agent against Denial of Service Attacks
    Aggarwal, Mayank
    Nipur
    Pallavi
    INTERNATIONAL CONFERENCE ON METHODS AND MODELS IN SCIENCE AND TECHNOLOGY (ICM2ST-10), 2010, 1324 : 316 - +
  • [46] PROTECTING NUCLEAR-FACILITIES AGAINST ATTACKS AND ACTS OF SABOTAGE
    BOCHMANN, HP
    ATOMWIRTSCHAFT-ATOMTECHNIK, 1984, 29 (02): : 75 - 79
  • [47] Defense-PointNet: Protecting PointNet Against Adversarial Attacks
    Zhang, Yu
    Liang, Gongbo
    Salem, Tawfiq
    Jacobs, Nathan
    2019 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2019, : 5654 - 5660
  • [48] DyPolDroid: Protecting Against Permission-Abuse Attacks in Android
    Carlos E. Rubio-Medrano
    Pradeep Kumar Duraisamy Soundrapandian
    Matthew Hill
    Luis Claramunt
    Jaejong Baek
    Geetha S
    Gail-Joon Ahn
    Information Systems Frontiers, 2023, 25 : 529 - 548
  • [49] Protecting individual information against inference attacks in data publishing
    Li, Chen
    Shirani-Mehr, Houtan
    Yang, Xiaochun
    ADVANCES IN DATABASES: CONCEPTS, SYSTEMS AND APPLICATIONS, 2007, 4443 : 422 - +
  • [50] Protecting FIDO Extensions Against Man-in-the-Middle Attacks
    Buttner, Andre
    Gruschka, Nils
    EMERGING TECHNOLOGIES FOR AUTHORIZATION AND AUTHENTICATION, ETAA 2022, 2023, 13782 : 70 - 87