![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Tripathi Anshu Singh Umesh Kumar
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.8, Iss.3, 2013-11, pp. : 139-153
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Computer Security Vulnerability as Concerns the Electricity Distribution Grid
Applied Artificial Intelligence, Vol. 28, Iss. 4, 2014-04 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
A new model of security for metasystems
By Chapin S.J. Wang C. Wulf W.A. Knabe F. Grimshaw A.
Future Generation Computer Systems, Vol. 15, Iss. 5, 1999-10 ,pp. :