Results 91 to 100 of about 57,287 (247)

Towards a Layered Architectural View for Security Analysis in SCADA Systems

open access: yes, 2012
Supervisory Control and Data Acquisition (SCADA) systems support and control the operation of many critical infrastructures that our society depend on, such as power grids. Since SCADA systems become a target for cyber attacks and the potential impact of
Ma, Zhendong   +2 more
core  

Operational Simulation Environment for SCADA Integration of Renewable Resources

open access: yesEnergies, 2020
The complexity of power systems is rising mainly due to the expansion of renewable energy generation. Due to the enormous variability and uncertainty associated with these types of resources, they require sophisticated planning tools so that they can be ...
Diego Francisco Larios   +5 more
doaj   +1 more source

Predicting Wind Turbine Blade Tip Deformation With Long Short‐Term Memory (LSTM) Models

open access: yesWind Energy, Volume 28, Issue 6, June 2025.
ABSTRACT Driven by the challenges in measuring blade deformations, this study presents a novel machine learning methodology to predict blade tip deformation using inflow wind data and operational parameters. Using a long short‐term memory (LSTM) model and a novel feature selection approach based on mutual information and recursive feature addition ...
Shubham Baisthakur, Breiffni Fitzgerald
wiley   +1 more source

A comprehensive review on enhancing wind turbine applications with advanced SCADA data analytics and practical insights

open access: yesIET Renewable Power Generation
The aim of this study is to explore the potential and economic benefits of utilising Supervisory Control and Data Acquisition (SCADA) data to improve wind turbine operation and maintenance activities.
Ravi Pandit, Jianlin Wang
doaj   +1 more source

Key Problems of the Critical Information Infrastructure through Scada Systems Research

open access: yesИнформатика и автоматизация, 2019
In the current age, cyber security is an essential element of any information system. A key aspect is in the critical information infrastructure, where information security has become a top priority for information and network security experts.
Georgi Rumenov Tsochev   +2 more
doaj   +1 more source

Review on Information Fusion‐Based Data Mining for Improving Complex Anomaly Detection

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 15, Issue 2, June 2025.
The performance of information fusion techniques within the framework of various anomaly detection methods applied in sensor data mining. ABSTRACT Anomaly predicated upon multiple distributed hybrid sensors frequently uses hybrid approaches, integrating techniques derived from statistical analysis, probability, data mining, machine learning, deep ...
Sorin‐Claudiu Moldovan   +1 more
wiley   +1 more source

The SCADA Threat Landscape [PDF]

open access: yesElectronic Workshops in Computing, 2013
Nations around the world rely on the correct and continued functioning of industrial control systems (ICS) to keep economies moving and provide critical services such as electricity and clean water. This paper provides an analysis of the current threat landscape facing ICS.
openaire   +2 more sources

Data Acquisition System for a Hydroelectric Turbine with Deformable Blades [PDF]

open access: yesArchives of Metallurgy and Materials
The scientific paper proposes a remote data transmission and acquisition system, for the analysis of the electrical parameters of a portable hydroelectric turbine with deformable blades placed on the stream. The major objective proposed by the authors is
A. Bogorin-Predescu, S. Titu, A.M. Titu
doaj   +1 more source

Issues common to Australian critical infrastructure providers scada networks discovered through computer and network vulnerability analysis [PDF]

open access: yes, 2008
This paper reports on generic issues discovered as a result of conducting computer and network vulnerability assessments (CNVA) on Australian critical infrastructure providers.
Valli, Craig, Woodward, Andrew
core   +1 more source

Key Management for SCADA [PDF]

open access: yes, 2002
In this paper we discuss various security aspects and requirements of the Supervisory Control and Data Acquisition (SCADA) system for the electric power grid. In particular we discuss a method of managing cryptographic keys and give sample cryptographic algorithms that are appropriate for the SCADA system.
Beaver, Cheryl L.   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy