Results 11 to 20 of about 20,660 (211)
The vigorous development of the Industrial Internet of Things brings the advanced connection function of the new generation of industrial automation and control systems.
Yu-Sheng Yang +5 more
doaj +1 more source
Securing SCADA Energy Management System under DDos Attacks Using Token Verification Approach
The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and ...
Yu-Sheng Yang +5 more
doaj +1 more source
A Novel Moving Target Defense Scheme With Physical Unclonable Functions-Based Authentication
Recent studies have discovered possible security issues on Supervisory Control and Data Acquisition systems (SCADA) in the critical architecture and focus on developing protection mechanisms on this system.
Chuan-Gang Liu
doaj +1 more source
Elliptic Curve Cryptography Considerations for Securing Automation and SCADA Systems
Securing critical infrastructures and manufacturing plants in the Industrial-Internet-Of-Things and Industry 4.0 is a challenge today due to the increased number of attacks against automation and SCADA systems.
Alexandra Tidrea +2 more
doaj +1 more source
Vulnerability detection in Supervisory Control and Data Acquisition (SCADA) network of a Smart Factory (SF) is a high-priority research area in the cyber-security domain.
Love Allen Chijioke Ahakonye +3 more
doaj +1 more source
Incident Analysis & Digital Forensics in SCADA and Industrial Control Systems [PDF]
SCADA and industrial control systems have been traditionally isolated in physically protected environments. However, developments such as standardisation of data exchange protocols and increased use of IP, emerging wireless sensor networks and machine-to-
May, John H R +2 more
core +1 more source
Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems [PDF]
Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor and control a wide range of safety-related functions.
Evangelopoulou, Maria +2 more
core +2 more sources
This article focuses on the introduction of advance security checks to counter negative publicity of supervisory control and data acquisition (SCADA) systems. The SCADA security concerns have come to be seen as a big deal because the systems can be found within power plants, refineries, pipelines, water treatment plants, and the telecommunications ...
openaire +1 more source
Design and Development of Layered Security: Future Enhancements and Directions in Transmission
Today, security is a prominent issue when any type of communication is being undertaken. Like traditional networks, supervisory control and data acquisition (SCADA) systems suffer from a number of vulnerabilities.
Aamir Shahzad +6 more
doaj +1 more source
Security and Vulnerability of SCADA Systems over IP-Based Wireless Sensor Networks
An overview of supervisory control and data acquisition (SCADA) systems is presented and relevant security concerns are addressed. To secure IP-based SCADA systems, it is vital to implement secure architectures which prevent access to the SCADA from ...
HyungJun Kim
doaj +1 more source

