Results 211 to 220 of about 63,163 (254)

Machine learning boosts wind turbine efficiency with smart failure detection and strategic placement. [PDF]

open access: yesSci Rep
Raju SK   +5 more
europepmc   +1 more source

SCADA-SST: a SCADA security testbed

2016 World Congress on Industrial Control Systems Security (WCICSS), 2016
The number of reported cybersecurity incidents on SCADA (Supervisory Control and Data Acquisition) systems increased significantly in the past few years. One contributing factor is the fact that security testing of live SCADA systems is not practical as such systems are expected to be operational 24/7.
Asem Ghaleb, Sami Zhioua, Ahmad Almulhem
openaire   +1 more source

Integrated view of SCADA [SCADA systems]

6th IET Water Event, 2008
A collection of slides from the author's conference presentation is given. This paper presents the SCADA systems for water management. (26 pages)
openaire   +1 more source

Securing SCADA systems

Information Management & Computer Security, 2008
PurposeSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public ...
Sandip C. Patel, Pritimoy Sanyal
openaire   +1 more source

Advanced SCADA concepts

IEEE Computer Applications in Power, 1995
The typical utility system planner faces a wide variety of concepts and applications to consider when procuring a supervisory control and data acquisition (SCADA) system. The system's performance requirements are influenced by an arena of rapidly advancing technologies and a highly competitive business environment. Unlike other elements of the electric
S.C. Sciacca, W.R. Block
openaire   +1 more source

RBAC Model for SCADA

2007
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy