Results 91 to 100 of about 57,287 (247)
Towards a Layered Architectural View for Security Analysis in SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong+2 more
core
Operational Simulation Environment for SCADA Integration of Renewable Resources
The complexity of power systems is rising mainly due to the expansion of renewable energy generation. Due to the enormous variability and uncertainty associated with these types of resources, they require sophisticated planning tools so that they can be ...
Diego Francisco Larios+5 more
doaj +1 more source
Predicting Wind Turbine Blade Tip Deformation With Long Short‐Term Memory (LSTM) Models
ABSTRACT Driven by the challenges in measuring blade deformations, this study presents a novel machine learning methodology to predict blade tip deformation using inflow wind data and operational parameters. Using a long short‐term memory (LSTM) model and a novel feature selection approach based on mutual information and recursive feature addition ...
Shubham Baisthakur, Breiffni Fitzgerald
wiley +1 more source
The aim of this study is to explore the potential and economic benefits of utilising Supervisory Control and Data Acquisition (SCADA) data to improve wind turbine operation and maintenance activities.
Ravi Pandit, Jianlin Wang
doaj +1 more source
Key Problems of the Critical Information Infrastructure through Scada Systems Research
In the current age, cyber security is an essential element of any information system. A key aspect is in the critical information infrastructure, where information security has become a top priority for information and network security experts.
Georgi Rumenov Tsochev+2 more
doaj +1 more source
Review on Information Fusion‐Based Data Mining for Improving Complex Anomaly Detection
The performance of information fusion techniques within the framework of various anomaly detection methods applied in sensor data mining. ABSTRACT Anomaly predicated upon multiple distributed hybrid sensors frequently uses hybrid approaches, integrating techniques derived from statistical analysis, probability, data mining, machine learning, deep ...
Sorin‐Claudiu Moldovan+1 more
wiley +1 more source
The SCADA Threat Landscape [PDF]
Nations around the world rely on the correct and continued functioning of industrial control systems (ICS) to keep economies moving and provide critical services such as electricity and clean water. This paper provides an analysis of the current threat landscape facing ICS.
openaire +2 more sources
Data Acquisition System for a Hydroelectric Turbine with Deformable Blades [PDF]
The scientific paper proposes a remote data transmission and acquisition system, for the analysis of the electrical parameters of a portable hydroelectric turbine with deformable blades placed on the stream. The major objective proposed by the authors is
A. Bogorin-Predescu, S. Titu, A.M. Titu
doaj +1 more source
Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis [PDF]
This paper reports on generic issues discovered as a result of conducting computer and network vulnerability assessments (CNVA) on Australian critical infrastructure providers.
Valli, Craig, Woodward, Andrew
core +1 more source
Key Management for SCADA [PDF]
In this paper we discuss various security aspects and requirements of the Supervisory Control and Data Acquisition (SCADA) system for the electric power grid. In particular we discuss a method of managing cryptographic keys and give sample cryptographic algorithms that are appropriate for the SCADA system.
Beaver, Cheryl L.+3 more
openaire +3 more sources