Citation to this article as recorded by
Cryptography Techniques Within SCADA System-Asurvey 2020 3rd International Conference on Engineering Technology and its Applications (IICETA) |
Construction of a Security Vulnerability Identification System Based on Machine Learning Journal of Sensors |
How to cite this article
A. Shahzad, S. Musa, M. Irfan and S. Asadullah, 2014. Key Encryption Method for SCADA Security Enhancement. Journal of Applied Sciences, 14: 2498-2506.
DOI: 10.3923/jas.2014.2498.2506
URL: https://scialert.net/abstract/?doi=jas.2014.2498.2506
DOI: 10.3923/jas.2014.2498.2506
URL: https://scialert.net/abstract/?doi=jas.2014.2498.2506