Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Vulnerability considerations for power line communication's supervisory control and data acquisition
Ali Hosseinpournajarkolaei; Hamid Jahankhani; Amin Hosseinian-Far
International Journal of Electronic Security and Digital Forensics (IJESDF), 2014 Vol.6 No.2, pp.104 - 114
15 + 10 =

Thank you for your feedback.