Results 11 to 20 of about 57,287 (247)

SCADA vs. the Hackers [PDF]

open access: bronzeMechanical Engineering, 2002
This article focuses on United States’ power grid vulnerability to cyber attack. None of the industrial control systems used to monitor and operate the nation's utilities and factories were designed with security in mind. Moreover, their very nature makes them difficult to secure.
Alan S. Brown
openalex   +4 more sources

Wireless SCADA [PDF]

open access: yesInternational Journal of Trend in Scientific Research and Development, 2019
The assembling businesses requires expanding requests of individuals along these lines assuming a noteworthy job in regular day to day existence and on the contrary hand, there is a requirement for speedy and safe delivering technique also. In the present time, remote and brought together administration is the need of control framework.
Nirmal Kumar   +2 more
openaire   +1 more source

Smart Device Profiling for Smart SCADA [PDF]

open access: yes, 2011
SCADA (Supervisory Control and Data Acquisition) systems are computer systems used for monitoring and controlling industrial processes such as power plants and power grid systems, water, gas and oil distribution systems, production systems for food, cars
Bolzoni, Damiano   +2 more
core   +8 more sources

A nearly zero-energy microgrid testbed laboratory: Centralized control strategy based on SCADA system [PDF]

open access: yes, 2020
Currently, despite the use of renewable energy sources (RESs), distribution networks are facing problems, such as complexity and low productivity. Emerging microgrids (MGs) with RESs based on supervisory control and data acquisition (SCADA) are an ...
Carni, D. L.   +5 more
core   +1 more source

Numerical Comparison of Pressure Points Analysis and Transient Model Leak Detection and Location Systems [PDF]

open access: yesJournal of Petroleum Science and Technology, 2022
This study offers the basis and numerical application of the pressure points analysis (PPA) technique and transient model (TM) leak detection and location systems (DLS).
Henry Ifowodo   +2 more
doaj   +1 more source

A SCADA System for Energy Management in Intelligent Buildings [PDF]

open access: yes, 2012
This paper develops an energy management platform for intelligent buildings using a SCADA system (Supervisory Control And Data Acquisition). This SCADA system integrates different types of information coming from the several technologies present in ...
Figueiredo, Joao, Sá da Costa, Jose
core   +1 more source

Implementasi sistem SCADA dengan metode kontrol PID pada motor DC penggerak conveyor belt

open access: yesJurnal Eltek, 2022
Sistem SCADA (Supervisory Control and Data Acquisition) merupakan teknologi komputer yang banyak digunakan pada sistem kendali di dunia industri saat ini.
Muhammad Khairuddin   +5 more
doaj   +1 more source

Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks

open access: yesIEEE Access, 2021
There exists a gap between existing security mechanisms and their ability to detect advancing threats. Antivirus and EDR (End Point Detection and Response) aim to detect and prevent threats; such security mechanisms are reactive.
Abdul Basit Ajmal   +5 more
doaj   +1 more source

Flow whitelisting in SCADA networks [PDF]

open access: yesInternational Journal of Critical Infrastructure Protection, 2013
Supervisory control and data acquisition (SCADA) networks are commonly deployed in large industrial facilities. Modern SCADA networks are becoming more vulnerable to cyber attacks due to the common use of standard communications protocols and increased interconnections with corporate networks and the Internet.
Barbosa, Rafael Ramos Regis   +2 more
openaire   +5 more sources

Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems [PDF]

open access: yes, 2013
SCADA and industrial control systems have been traditionally isolated in physically protected environments. However, developments such as standardisation of data exchange protocols and increased use of IP, emerging wireless sensor networks and machine-to-
May, John H R   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy