Attack Recovery Mechanisms for ICS: Common Cyberattacks, Cryptographic Key Management, and Host-Based Mitigation Strategies
Crossref DOI link: https://doi.org/10.1007/978-3-032-03018-4_16
Published Online: 2026-01-22
Published Print: 2026
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Rahman, Mohammad Ashiqur
Alam, Syed Bahauddin
Gupta, Kishor Datta
George, Roy
Siddique, Sunzida
Kobayashi, Kazuma
Text and Data Mining valid from 2026-01-01
Version of Record valid from 2026-01-01
Chapter History
First Online: 22 January 2026