Results 161 to 170 of about 20,660 (211)
Some of the next articles are maybe not open access.
Security issues in SCADA networks
Computers and Security, 2006The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. This paper provides an overview of all the crucial research issues that are involved in strengthening the cyber security of SCADA networks.
Vinay M. Igure +2 more
exaly +2 more sources
SCADA security in the light of Cyber-Warfare
Computers and Security, 2012Supervisory Control and Data Acquisition (SCADA) systems are deployed worldwide in many critical infrastructures ranging from power generation, over public transport to industrial manufacturing systems. Whilst contemporary research has identified the need for protecting SCADA systems, these information are disparate and do not provide a coherent view ...
Tushar Patel, Helge Janicke
exaly +2 more sources
Enhancing SCADA System Security
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), 2020Today’s Supervisory Control and Data Acquisition (SCADA) networks manage power grids, water and sewer systems, automated factories, and many other complex systems. As these systems have evolved, so have the security challenges they face. We describe our research in strengthening SCADA security through development of a test bed for experimentation ...
Moustapha Fall +4 more
openaire +1 more source
SCADA-SST: a SCADA security testbed
2016 World Congress on Industrial Control Systems Security (WCICSS), 2016The number of reported cybersecurity incidents on SCADA (Supervisory Control and Data Acquisition) systems increased significantly in the past few years. One contributing factor is the fact that security testing of live SCADA systems is not practical as such systems are expected to be operational 24/7.
Asem Ghaleb, Sami Zhioua, Ahmad Almulhem
openaire +1 more source
Information Management & Computer Security, 2008
PurposeSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public ...
Sandip C. Patel, Pritimoy Sanyal
openaire +1 more source
PurposeSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public ...
Sandip C. Patel, Pritimoy Sanyal
openaire +1 more source
International Journal of Cyber Warfare and Terrorism, 2015
SCADA (Supervisory Control and Data Acquisition System) is a cyber-physical system, wherein IT (Information Technology) components work in conjunction with field devices to control a physical process. The security of these IT components becomes crucial in view of the damaging effects that any security breach of these IT components can have on the ...
Rahul Rastogi, Rossouw von Solms
openaire +1 more source
SCADA (Supervisory Control and Data Acquisition System) is a cyber-physical system, wherein IT (Information Technology) components work in conjunction with field devices to control a physical process. The security of these IT components becomes crucial in view of the damaging effects that any security breach of these IT components can have on the ...
Rahul Rastogi, Rossouw von Solms
openaire +1 more source
Cyber-security of SCADA systems
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 2012After a general introduction of the VIKING EU FP7 project two specific cyber-attack mechanisms, which have been analyzed in the VIKING project, will be discussed in more detail. Firstly an attack and its consequences on the Automatic Generation Control (AGC) in a power system are investigated, and secondly the cyber security of State Estimators in ...
Göran Andersson +8 more
openaire +1 more source
Building a SCADA Security Testbed
2009 Third International Conference on Network and System Security, 2009SCADA (Supervisory Control and Data Acquisition) systems control and monitor industrial and critical infrastructure functions, such as the electricity, gas, water, waste, railway and traffic. Recent attacks on SCADA systems highlight the need of a SCADA security testbed, which can be used to model real SCADA systems and study the effects of attacks on ...
Carlos Queiroz +4 more
openaire +1 more source
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research, 2011
Securing SCADA systems is a critical aspect of Smart grid security. As sophisticated attacks continue to target industrial systems, the focus should be on planning and developing new security techniques that will adapt to the SCADA environment and protocols.
Aniket Rodrigues, Tish Best, Ravi Pendse
openaire +1 more source
Securing SCADA systems is a critical aspect of Smart grid security. As sophisticated attacks continue to target industrial systems, the focus should be on planning and developing new security techniques that will adapt to the SCADA environment and protocols.
Aniket Rodrigues, Tish Best, Ravi Pendse
openaire +1 more source

