From: Surveillance and security: protecting electricity utilities and other critical infrastructures
Primary study | GQ1 | GQ2 | GQ3 | FQ1 | FQ2 | FQ3 |
---|---|---|---|---|---|---|
S1 | X | Â | Â | X | Â | Â |
S2 | X | X | X | X | X | Â |
S3 | X | X | Â | Â | X | X |
S4 | X | X | X | Â | Â | Â |
S5 | X | X | Â | Â | X | Â |
S6 | X | X | Â | Â | X | Â |
S7 | X | Â | Â | X | Â | Â |
S8 | X | X | X | X | X | Â |
S9 | X | Â | X | Â | X | Â |
S10 | X | X | Â | X | X | Â |
S11 | X | X | X | X | Â | Â |
S12 | X | Â | Â | Â | X | Â |
S13 | X | X | X | Â | Â | Â |
S14 | X | X | Â | Â | X | Â |
S15 | X | X | X | X | Â | Â |