From: Surveillance and security: protecting electricity utilities and other critical infrastructures
Primary study | QA1 | QA2 | QA3 | QA4 | QA5 | QA6 |
---|---|---|---|---|---|---|
S1 | X | X | X | |||
S2 | X | X | X | X | ||
S3 | X | X | X | |||
S4 | X | X | X | X | ||
S5 | X | X | X | X | X | X |
S6 | X | X | ||||
S7 | X | X | X | X | ||
S8 | X | X | X | X | X | |
S9 | X | X | ||||
S10 | X | X | X | X | ||
S11 | X | X | X | |||
S12 | X | X | X | |||
S13 | X | X | X | X | ||
S14 | X | X | X | X | ||
S15 | X | X | X | X | X |