Using Honeypots for ICS Threats Evaluation
Crossref DOI link: https://doi.org/10.1007/978-3-030-31328-9_9
Published Online: 2019-10-06
Published Print: 2020
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Dutta, Nitul
Jadav, Nilesh
Dutiya, Nirali
Joshi, Dhara
Text and Data Mining valid from 2019-10-06
Version of Record valid from 2019-10-06
Chapter History
First Online: 6 October 2019