Results 101 to 110 of about 20,660 (211)
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased.
Aamir Shahzad +5 more
doaj +1 more source
Verifying and Monitoring IoTs Network Behavior using MUD Profiles
IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens.
Benson, Theophilus A. +5 more
core
A Security Architecture for SCADA Systems
Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack on any system exploits some undesired (malicious or accidental) functionality in the components of the system.
Arun Velagapalli, Mahalingam Ramkumar
openaire +2 more sources
Enhancing SCADA Security Using Generative Adversarial Network
Supervisory Control and Data Acquisition (SCADA) systems play a critical role in industrial processes by providing real-time monitoring and control of equipment across large-scale, distributed operations.
Hong Nhung Nguyen, Jakeoung Koo
doaj +1 more source
SIMULASI SISTEM VIRTUAL SCADA PUSAT LISTRIK TENAGA NUKLIR JENIS PRESSURIZED WATER REACTOR [PDF]
Sistem Virtual SCADA merupakan software berbasis Human Machine Interface yang mampu memvisualisasikan proses sebuah plant. Skripsi ini menjelaskan hasil dari perancangan sistem Virtual SCADA yang bertujuan untuk mengetahui prinsip kerja Pusat Listrik ...
Wijaksono, Umar
core
Fault-Tolerant SCADA Systems Using ECC for Enhanced Cybersecurity and Data Integrity
This study focuses on the implementation of Error Correction Code (ECC) in Supervisory Control and Data Acquisition (SCADA) systems for a better performance of error controls and the system as well.
Iehab Abduljabbar Kamil +1 more
doaj +1 more source
Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core
Semantic Support for Log Analysis of Safety-Critical Embedded Systems
Testing is a relevant activity for the development life-cycle of Safety Critical Embedded systems. In particular, much effort is spent for analysis and classification of test logs from SCADA subsystems, especially when failures occur. The human expertise
Ficco, Massimo +3 more
core
Low-Cost and Secure Communication System for SCADA System of Remote Microgrids
Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. This research has been carried out to
Amjad Iqbal, M. Tariq Iqbal
doaj +1 more source

