Results 171 to 180 of about 20,660 (211)
Some of the next articles are maybe not open access.

Ontology and protocol secure for SCADA

International Journal of Metadata, Semantics and Ontologies, 2014
In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems.
Nabil Sahli   +2 more
openaire   +1 more source

SCADA Security: Concepts and Recommendations

2018
SCADA systems are the computers that control essential, complicated, and often dangerous physical processes, many of which constitute the physical infrastructure critical to modern societies. These physical processes are powerful tools, and their misuse generally has unacceptable consequences. Preventing such abuse is the goal of SCADA security.
Dragos Ionica   +4 more
openaire   +1 more source

A model for security management of SCADA systems

2008 IEEE International Conference on Emerging Technologies and Factory Automation, 2008
Current infrastructure for SCADA systems within industry are increasing in complexity and size and are demanding models that are more accurate for system management. Management models that are based on policies are becoming suitable for such situations, since they are able to provide flexibility, scalability and uniformity when a large number of ...
Ivano Miranda dos Anjos   +2 more
openaire   +1 more source

Evaluation of security solutions in the SCADA environment

ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 2014
Supervisory Control and Data Acquisition (SCADA) systems control and monitor the electric power grid, water treatment facilities, oil and gas pipelines, railways, and other critical infrastructure assets. With the advent of greater connectivity via the Internet, organizations that own and operate these systems have increasingly interconnected them with
Robert D. Larkin   +3 more
openaire   +1 more source

Development of the PowerCyber SCADA security testbed

Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, 2010
Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software.
Adam Hahn   +6 more
openaire   +1 more source

Cyber Security Backdrop: A SCADA testbed

2014 IEEE Computers, Communications and IT Applications Conference, 2014
Supervisory Control and Data Acquisition (SCADA) systems are traditionally proprietary and well protected. Due to increasing use of commercial/open source technology and communication protocols, there are growing concerns about the associated security threats. SCADA networks are usually employed in critical infrastructure, therefore, not much technical
Adnan A. Farooqui   +3 more
openaire   +1 more source

Secured Scada System

Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1, 2014
Abstract: SCADA ( Supervisory control and data acquisition) is a system which allows a control of remote industrial equipments, over a communication channel. These legacy communication channels were designed before the cyber space era,and hence they lack any security measures in their network which makes them vulnerable to any cyber attack.
openaire   +1 more source

A testbed for secure and robust SCADA systems

ACM SIGBED Review, 2008
The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a need to have a SCADA testbed for checking vulnerabilities and validating security solutions.
Annarita Giani   +5 more
openaire   +1 more source

Taxonomy of SCADA systems security testbeds

International Journal of Critical Infrastructures, 2014
Considerable research has focused on developing simulation environments to study the effects of cyber-attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and ...
Antonio Di Pietro, Stefano Panzieri
openaire   +1 more source

Security and protection of SCADA

Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Due to technological advances, it has been a common practice for quite some time to use embedded computers for the monitoring and control of physical processes/plants. These are essentially networked computer-based systems consisting of application-specific control-processing systems, actuators, sensors etc., used for digitally controlling physical ...
openaire   +1 more source

Home - About - Disclaimer - Privacy