Results 171 to 180 of about 20,660 (211)
Some of the next articles are maybe not open access.
Ontology and protocol secure for SCADA
International Journal of Metadata, Semantics and Ontologies, 2014In this work, we present a semantic cyber security system and we study its semantic intelligent systems vulnerabilities, focusing on the semantic attacks. For resolving semantic problems we propose a security global solution for the new generation of SCADA systems.
Nabil Sahli +2 more
openaire +1 more source
SCADA Security: Concepts and Recommendations
2018SCADA systems are the computers that control essential, complicated, and often dangerous physical processes, many of which constitute the physical infrastructure critical to modern societies. These physical processes are powerful tools, and their misuse generally has unacceptable consequences. Preventing such abuse is the goal of SCADA security.
Dragos Ionica +4 more
openaire +1 more source
A model for security management of SCADA systems
2008 IEEE International Conference on Emerging Technologies and Factory Automation, 2008Current infrastructure for SCADA systems within industry are increasing in complexity and size and are demanding models that are more accurate for system management. Management models that are based on policies are becoming suitable for such situations, since they are able to provide flexibility, scalability and uniformity when a large number of ...
Ivano Miranda dos Anjos +2 more
openaire +1 more source
Evaluation of security solutions in the SCADA environment
ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 2014Supervisory Control and Data Acquisition (SCADA) systems control and monitor the electric power grid, water treatment facilities, oil and gas pipelines, railways, and other critical infrastructure assets. With the advent of greater connectivity via the Internet, organizations that own and operate these systems have increasingly interconnected them with
Robert D. Larkin +3 more
openaire +1 more source
Development of the PowerCyber SCADA security testbed
Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research, 2010Meeting current demands for critical infrastructure cyber security education and research will require accurate testbed development. The PowerCyber was designed to closely resemble power grid communication utilizing actual field devices and SCADA software.
Adam Hahn +6 more
openaire +1 more source
Cyber Security Backdrop: A SCADA testbed
2014 IEEE Computers, Communications and IT Applications Conference, 2014Supervisory Control and Data Acquisition (SCADA) systems are traditionally proprietary and well protected. Due to increasing use of commercial/open source technology and communication protocols, there are growing concerns about the associated security threats. SCADA networks are usually employed in critical infrastructure, therefore, not much technical
Adnan A. Farooqui +3 more
openaire +1 more source
Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1, 2014
Abstract: SCADA ( Supervisory control and data acquisition) is a system which allows a control of remote industrial equipments, over a communication channel. These legacy communication channels were designed before the cyber space era,and hence they lack any security measures in their network which makes them vulnerable to any cyber attack.
openaire +1 more source
Abstract: SCADA ( Supervisory control and data acquisition) is a system which allows a control of remote industrial equipments, over a communication channel. These legacy communication channels were designed before the cyber space era,and hence they lack any security measures in their network which makes them vulnerable to any cyber attack.
openaire +1 more source
A testbed for secure and robust SCADA systems
ACM SIGBED Review, 2008The Supervisory Control and Data Acquisition System (SCADA) monitor and control real-time systems. SCADA systems are the backbone of the critical infrastructure, and any compromise in their security can have grave consequences. Therefore, there is a need to have a SCADA testbed for checking vulnerabilities and validating security solutions.
Annarita Giani +5 more
openaire +1 more source
Taxonomy of SCADA systems security testbeds
International Journal of Critical Infrastructures, 2014Considerable research has focused on developing simulation environments to study the effects of cyber-attacks on supervisory control and data acquisition (SCADA) systems although a methodology to develop a SCADA security testbed is not yet available. This paper attempts to address the issue by presenting a reference model taken from the literature and ...
Antonio Di Pietro, Stefano Panzieri
openaire +1 more source
Security and protection of SCADA
Proceedings of the 6th International Conference on Security of Information and Networks, 2013Due to technological advances, it has been a common practice for quite some time to use embedded computers for the monitoring and control of physical processes/plants. These are essentially networked computer-based systems consisting of application-specific control-processing systems, actuators, sensors etc., used for digitally controlling physical ...
openaire +1 more source

