Media Coverage of this Article
Found additional news media or blog coverage for the article? Please contact us at
submission@sciepub.com
.
More by these Authors
A Survey on Cryptography Key Management Schemes for Smart Grid
Bashar Alohali, Kashif Kifayat, Qi Shi, William Hurst
Journal of Computer Sciences and Applications
,
Vol. 3, No. 3A, 2015
, pp 27-39 | Special Issue
doi:10.12691/jcsa-3-3A-4.
Full-Text (PDF)
Full-Text (Epub)
Full-Text (HTML)
Related keywords
critical infrastructure data analytics
cyber security
data analysis
real time sensors
machine learning
intrusion detection
control system
cloud computing
data fusion
web services