Results 91 to 100 of about 20,660 (211)

Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation

open access: yes, 2018
Owing to a growing number of attacks, the assessment of Industrial Control Systems (ICSs) has gained in importance. An integral part of an assessment is the creation of a detailed inventory of all connected devices, enabling vulnerability evaluations ...
Auffret P   +18 more
core   +1 more source

Optimalisasi Keamanan Siber dan AI dalam Akselerasi Transformasi Digital Sektor Industri Sumatera Selatan

open access: yesJurnal Pengabdian UNDIKMA
This community service program aims to strengthen the digital defense system of PT PLN Palembang through the integration of cybersecurity technology and artificial intelligence (AI).
Deris Stiawan   +6 more
doaj   +1 more source

An Implementation of SCADA Network Security Testbed

open access: yesCoRR, 2017
The security of industrial network has become an increasing concern in industry infrastructure operation. Motivated by on-going collaborations with Fortinet Corp., a security company, this project implements a testbed for supervisory control and data acquisition (SCADA) network security research by software emulation.
openaire   +2 more sources

Computer-Aided System for Wind Turbine Data Analysis [PDF]

open access: yes, 2010
Context: The current work on wind turbine failure detection focuses on researching suitable signal processing algorithms and developing efficient diagnosis algorithms. The laboratory research would involve large and complex data, and it can be a daunting
Chen, Bindi
core  

Security analysis of cyber physical system using digital forensic incident response

open access: yesCyber Security and Applications
There is a great demand for an efficient security tool which can secure IIoT systems from potential adversarial attacks. However, it is challenging to design a suitable security model for IIoT considering the closed, dynamic and distributed architecture.
Pranita Binnar, Sunil Bhirud, Faruk Kazi
doaj   +1 more source

A Comprehensive Security Framework for Publish/Subscribe-Based IoT Services Communication

open access: yesIEEE Access, 2019
The publish/subscribe paradigm provides a loosely-coupled and scalable communication model for the large-scale IoT service systems, such as supervisory control and data acquisition (SCADA).
Li Duan   +4 more
doaj   +1 more source

An analysis of security issues in building automation systems [PDF]

open access: yes, 2014
The purpose of Building Automation Systems (BAS) is to centralise the management of a wide range of building services, through the use of integrated protocol and communication media.
Johnstone, Michael N, Peacock, Matthew D
core   +2 more sources

Multi-Layer Cyber-Physical Security and Resilience for Smart Grid

open access: yes, 2018
The smart grid is a large-scale complex system that integrates communication technologies with the physical layer operation of the energy systems. Security and resilience mechanisms by design are important to provide guarantee operations for the system ...
CH Hauser   +19 more
core   +1 more source

Improving Security in SCADA Systems

open access: yesElectrical and Electronic Engineering, 2012
Supervisory control and data acquisition (SCADA) systems and distributed control systems (DCS) were in- novated to reduce labor costs, and to permit system-wide monitoring and remote control from a headquarter. Control systems are widely implemented in critical infrastructures such as electric grid, natural gas and petroleum, water, and wastewater ...
Samad Araghi, Ali Akbar Shams-Baboli
openaire   +1 more source

Common criteria for security evaluation and malicious intrusion detection mechanism of dam supervisory control and data acquisition system

open access: yesIET Networks
Supervisory control and data acquisition (SCADA) systems are vital in monitoring and controlling industrial processes through the web. However, while such systems result in lower costs, greater utilisation efficiency, and improved reliability, they are ...
Kuan‐Chu Lu   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy