Results 211 to 220 of about 63,163 (254)
Optimal micro-grid battery scheduling within a comprehensive smart pricing scheme. [PDF]
Ali MA, Besheer AH, Emara HM, Bahgat A.
europepmc +1 more source
Artificial intelligence-based fault classification on photovoltaic plants using a low-cost open-source IoT system. [PDF]
Srisiri W +5 more
europepmc +1 more source
Optimized ANN-RF hybrid model with optuna for fault detection and classification in power transmission systems. [PDF]
Uzel H, Özüpak Y, Alpsalaz F, Aslan E.
europepmc +1 more source
Machine learning boosts wind turbine efficiency with smart failure detection and strategic placement. [PDF]
Raju SK +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
SCADA-SST: a SCADA security testbed
2016 World Congress on Industrial Control Systems Security (WCICSS), 2016The number of reported cybersecurity incidents on SCADA (Supervisory Control and Data Acquisition) systems increased significantly in the past few years. One contributing factor is the fact that security testing of live SCADA systems is not practical as such systems are expected to be operational 24/7.
Asem Ghaleb, Sami Zhioua, Ahmad Almulhem
openaire +1 more source
Integrated view of SCADA [SCADA systems]
6th IET Water Event, 2008A collection of slides from the author's conference presentation is given. This paper presents the SCADA systems for water management. (26 pages)
openaire +1 more source
Information Management & Computer Security, 2008
PurposeSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public ...
Sandip C. Patel, Pritimoy Sanyal
openaire +1 more source
PurposeSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public ...
Sandip C. Patel, Pritimoy Sanyal
openaire +1 more source
IEEE Computer Applications in Power, 1995
The typical utility system planner faces a wide variety of concepts and applications to consider when procuring a supervisory control and data acquisition (SCADA) system. The system's performance requirements are influenced by an arena of rapidly advancing technologies and a highly competitive business environment. Unlike other elements of the electric
S.C. Sciacca, W.R. Block
openaire +1 more source
The typical utility system planner faces a wide variety of concepts and applications to consider when procuring a supervisory control and data acquisition (SCADA) system. The system's performance requirements are influenced by an arena of rapidly advancing technologies and a highly competitive business environment. Unlike other elements of the electric
S.C. Sciacca, W.R. Block
openaire +1 more source
2007
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh +2 more
openaire +2 more sources
This paper focuses on recommending the usage of the Role-Based Access Control (RBAC) model to define the users’ security roles, permissions, authorization, and role hierarchy to access the SCADA system. Achieving the desired level of authorization and access control will involve integrating the secur ity system with SCADA operations and building role ...
M. Majdalawieh +2 more
openaire +2 more sources

