Results 181 to 190 of about 56,390 (218)
Some of the next articles are maybe not open access.
A generalized model for wind turbine anomaly identification based on SCADA data
Applied Energy, 2016Jian Li, Caisheng Wang
exaly
SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues
Computers and Security, 2023exaly
A review of cyber security risk assessment methods for SCADA systems
Computers and Security, 2016Yulia Cherdantseva +2 more
exaly

