Research Article

Design of Intrusion Detection and Prevention in SCADA System for the Detection of Bias Injection Attacks

Figure 4

Performance of the HECC with the ECC and RSA based on encryption time.
(a)
(b)
(c)