How safe are critical infrastructures from hacker attacks?

Outdated technology in use. As wind turbines are often scattered across large areas, they cannot be entirely controlled via cables. “Mobile telephony networks have to be used for the last mile of the control,” says David Rupprecht, PhD student and participant in the Bercom project.

Posted: 2017-09-14 18:48:00

Read all

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.