A NOVEL CLOUD REMOVAL METHOD BASED ON IHOT AND THE CLOUD TRAJECTORIES FOR LANDSAT IMAGERY


Attribution of Cyber Attacks on Industrial Control Systems

Tap Y-Adaptor In order to deter or prosecute for cyber attacks on industrial control systems it is necessary to assign attribution to the attacker and define the type of attack so that international law enforcement agencies or national governments can decide on appropriate recourse.In this paper we identify the current state of the art of attributi

read more