CORE
đșđŠÂ
 make metadata, not war
Services
Research
Services overview
Explore all CORE services
Access to raw data
API
Dataset
FastSync
Content discovery
Recommender
Discovery
OAI identifiers
OAI Resolver
Managing content
Dashboard
Bespoke contracts
Consultancy services
Support us
Support us
Membership
Sponsorship
Community governance
Advisory Board
Board of supporters
Research network
About
About us
Our mission
Team
Blog
FAQs
Contact us
Analyzing Security Vulnerabilities and Attacks
Authors
James J. Barlow
Nidhi Doshi
+4Â more
Ravishankar K. Iyer
Zbigniew T. Kalbarczyk
Aashish Sharma
Long Wang
Publication date
1 January 2011
Publisher
Coordinated Science Laboratory, University of Illinois at Urbana-Champaign
Abstract
Coordinated Science Laboratory was formerly known as Control Systems Laborator
Similar works
Full text
Open in the Core reader
Download PDF
Available Versions
Illinois Digital Environment for Access to Learning and Scholarship Repository
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:www.ideals.illinois.edu:21...
Last time updated on 11/06/2018
IDEALS @ Illinois
See this paper in CORE
Go to the repository landing page
Download from data provider
oai:www.ideals.illinois.edu:21...
Last time updated on 05/04/2020