From: Surveillance and security: protecting electricity utilities and other critical infrastructures
Primary study | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 |
---|---|---|---|---|---|---|
S1 | X | X | Â | Â | Â | X |
S2 | X | X | X | X | Â | Â |
S3 | X | X | Â | Â | X | Â |
S4 | X | X | Â | X | X | Â |
S5 | X | X | X | X | X | X |
S6 | X | Â | Â | X | Â | Â |
S7 | X | X | Â | X | X | Â |
S8 | X | X | X | X | X | Â |
S9 | X | Â | Â | Â | X | Â |
S10 | X | X | Â | X | X | Â |
S11 | X | Â | Â | X | Â | X |
S12 | X | X | Â | X | Â | Â |
S13 | X | X | Â | X | X | Â |
S14 | X | X | X | Â | X | Â |
S15 | X | X | X | X | Â | X |