2012
DOI: 10.1007/s12083-012-0181-3
|View full text |Cite
|
Sign up to set email alerts
|

Router architecture evaluation for security network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 3 publications
0
1
0
Order By: Relevance
“…Other solutions can involve more costly implementation, such as purchasing specially designed firewall devices that can be uniquely configured to offer additional security when integrated into a utility's network (Choi et al ). But this shouldn't discount the use of firewall devices to secure a network, as they can be valuable in ensuring that hackers are unable to gain access to utility SCADA and administrative systems (Loew et al ).…”
Section: Limiting Hacker Accessmentioning
confidence: 99%
“…Other solutions can involve more costly implementation, such as purchasing specially designed firewall devices that can be uniquely configured to offer additional security when integrated into a utility's network (Choi et al ). But this shouldn't discount the use of firewall devices to secure a network, as they can be valuable in ensuring that hackers are unable to gain access to utility SCADA and administrative systems (Loew et al ).…”
Section: Limiting Hacker Accessmentioning
confidence: 99%