no code implementations • 26 Jun 2023 • Abhijeet Sahu, Patrick Wlazlo, Nastassja Gaudet, Ana Goulart, Edmond Rogers, Katherine Davis
These protocols are vulnerable to cyber threats that power systems, as cyber-physical critical infrastructure, must be protected against.