Results 101 to 110 of about 20,660 (211)

A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

open access: yesSensors, 2016
Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased.
Aamir Shahzad   +5 more
doaj   +1 more source

Verifying and Monitoring IoTs Network Behavior using MUD Profiles

open access: yes, 2019
IoT devices are increasingly being implicated in cyber-attacks, raising community concern about the risks they pose to critical infrastructure, corporations, and citizens.
Benson, Theophilus A.   +5 more
core  

A Security Architecture for SCADA Systems

open access: yesJournal of Information Security, 2018
Supervisory Control and Data Acquisition (SCADA) systems are attractive targets for attackers, as they offer an avenue to attack critical infrastructure (CI) systems controlled by SCADA systems. Ultimately, an attack on any system exploits some undesired (malicious or accidental) functionality in the components of the system.
Arun Velagapalli, Mahalingam Ramkumar
openaire   +2 more sources

Enhancing SCADA Security Using Generative Adversarial Network

open access: yesJournal of Cybersecurity and Privacy
Supervisory Control and Data Acquisition (SCADA) systems play a critical role in industrial processes by providing real-time monitoring and control of equipment across large-scale, distributed operations.
Hong Nhung Nguyen, Jakeoung Koo
doaj   +1 more source

SIMULASI SISTEM VIRTUAL SCADA PUSAT LISTRIK TENAGA NUKLIR JENIS PRESSURIZED WATER REACTOR [PDF]

open access: yes, 2015
Sistem Virtual SCADA merupakan software berbasis Human Machine Interface yang mampu memvisualisasikan proses sebuah plant. Skripsi ini menjelaskan hasil dari perancangan sistem Virtual SCADA yang bertujuan untuk mengetahui prinsip kerja Pusat Listrik ...
Wijaksono, Umar
core  

Fault-Tolerant SCADA Systems Using ECC for Enhanced Cybersecurity and Data Integrity

open access: yesAl-Rafidain Journal of Computer Sciences and Mathematics
This study focuses on the implementation of Error Correction Code (ECC) in Supervisory Control and Data Acquisition (SCADA) systems for a better performance of error controls and the system as well.
Iehab Abduljabbar Kamil   +1 more
doaj   +1 more source

Why We Cannot (Yet) Ensure the Cybersecurity of Safety-Critical Systems [PDF]

open access: yes, 2016
There is a growing threat to the cyber-security of safety-critical systems. The introduction of Commercial Off The Shelf (COTS) software, including Linux, specialist VOIP applications and Satellite Based Augmentation Systems across the aviation ...
Johnson, Christopher W.
core  

Semantic Support for Log Analysis of Safety-Critical Embedded Systems

open access: yes, 2014
Testing is a relevant activity for the development life-cycle of Safety Critical Embedded systems. In particular, much effort is spent for analysis and classification of test logs from SCADA subsystems, especially when failures occur. The human expertise
Ficco, Massimo   +3 more
core  

Low-Cost and Secure Communication System for SCADA System of Remote Microgrids

open access: yesJournal of Electrical and Computer Engineering, 2019
Renewable energy-based local microgrids are gaining popularity despite the unavailability of low-cost, power efficient, and secure communication system for its supervisory control and data acquisition (SCADA) system. This research has been carried out to
Amjad Iqbal, M. Tariq Iqbal
doaj   +1 more source

Security Strategies for SCADA Networks [PDF]

open access: yes, 2007
Rodrigo Chandia   +4 more
openaire   +1 more source

Home - About - Disclaimer - Privacy