Results 61 to 70 of about 57,287 (247)

APT Attack Analysis in SCADA Systems

open access: yesMATEC Web of Conferences, 2018
SCADA (Supervisory Control and Data Acquisition) systems play a significant role in ICS (Industrial Control System). Safety, security and stable operation is crucial to the SCADA system.
Zhou Xiaojun   +5 more
doaj   +1 more source

Real‐Time Prediction of Overpressure‐Induced Pipeline Failure via Edge‐Optimized Machine Learning

open access: yesEnergy Science &Engineering, EarlyView.
This paper presents the machine learning models, driven by 300 groups of field data data set and key results from the hydraulic model, to achieve the accurate prediction of failure problems during the gas–liquid pipeline. Eight algorithms are presented and compared to achieve algorithm optimization in this work.
Sihang Chen   +5 more
wiley   +1 more source

Wind turbine condition monitoring : technical and commercial challenges. [PDF]

open access: yes, 2014
Deployment of larger scale wind turbine systems, particularly offshore, requires more organized operation and maintenance strategies to ensure systems are safe, profitable and cost-effective.
Amirat   +35 more
core   +1 more source

SCALE PROTOTYPE RING MAIN UNIT FOR THE MEASUREMENT AND CONTROL OF NODES IN A SMART GRID

open access: yesRevista Politécnica, 2018
Smart grids are playing a key role in modern electric power grids, improving load control, assuring safer operations and collecting valuable information of the electrical conditions of the grid.
Andres Eduardo Nieto Vallejo   +1 more
doaj   +1 more source

Some Security Issues with the Industrial Internet of Things and Comparison to SCADA Systems

open access: yesИнформатика и автоматизация, 2020
An issue of the Internet of Things security which does not belong to the traditional problem of cybersecurity, as it is a local or distributed monitoring and/or monitoring of physical systems state connected via the Internet, is considered.
Georgi Rumenov Tsochev   +2 more
doaj   +1 more source

SCEN‐SCADA Security: An Enhanced Osprey Optimization‐Based Cyber Attack Detection Model in Supervisory Control and Data Acquisition System Using Serial Cascaded Ensemble Network

open access: yesOptimal Control Applications and Methods, EarlyView.
An efficient and accurate cyber attack detection approach with less computational overhead is still a crucial research problem in SCADA. So, a novel and secure model for cyber attack detection in the SCADA system using advanced deep learning techniques together with the heuristic algorithm is executed in this research work. The weighted optimal feature
Fatimah Yaseen Hashim Alzubaidi   +3 more
wiley   +1 more source

Alarm design for SCADA system of assembly cell-200 trainer [PDF]

open access: yes, 2008
Alarm systems play a vital role in maintaining the safe operation in process plant. Moreover, the safety and efficiency of a plant's operation is assured by the usage of a reliable and user friendly alarm system. In this project, the main objective is to
Zawawi, Mukmin
core  

Improving SIEM for critical SCADA water infrastructures using machine learning [PDF]

open access: yes, 2019
Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems.
A Bujari   +17 more
core   +8 more sources

A Systematic Review of Empirical Studies on Situation Awareness: Perspectives From the Interaction Among Humans, Machines, and the Task Environment

open access: yesPsyCh Journal, EarlyView.
ABSTRACT Situational awareness (SA) refers to “knowing what is going on” in a situation. As an essential concept originating in aviation literature approximately 40 years ago, SA has demonstrated significant potential and has since been extended across various fields, leading to a growing body of research.
Rong Fang   +7 more
wiley   +1 more source

A Survey on IT-Techniques for a Dynamic Emergency Management in Large Infrastructures [PDF]

open access: yes, 2010
This deliverable is a survey on the IT techniques that are relevant to the three use cases of the project EMILI. It describes the state-of-the-art in four complementary IT areas: Data cleansing, supervisory control and data acquisition, wireless sensor ...
Brodt, Simon   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy