Results 21 to 30 of about 20,660 (211)

SCADA System Security, Complexity, and Security Proof [PDF]

open access: yes, 2013
Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems were designed without security functionality.
Reda Shbib   +2 more
openaire   +1 more source

A Multi-Model Proposal for Classification and Detection of DDoS Attacks on SCADA Systems

open access: yesApplied Sciences, 2023
Industrial automation and control systems have gained increasing attention in the literature recently. Their integration with various systems has triggered considerable developments in critical infrastructure systems.
Esra Söğüt, O. Ayhan Erdem
doaj   +1 more source

Proposal of a Secure Modbus RTU Communication with Adi Shamir's Secret Sharing Method [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2018
Drinking fresh water, turning the lights on, travelling by tram, calling our family, or getting a medical treatment are usual activities, but the underlying SCADA (Supervisory Control and Data Acquisition) systems like CIS (Critical Infrastructure ...
Éva Ádámkó   +2 more
doaj   +1 more source

Assessing and augmenting SCADA cyber security: a survey of techniques [PDF]

open access: yes, 2017
SCADA systems monitor and control critical infrastructures of national importance such as power generation and distribution, water supply, transportation networks, and manufacturing facilities.
Almalawi   +119 more
core   +2 more sources

APT Attack Analysis in SCADA Systems

open access: yesMATEC Web of Conferences, 2018
SCADA (Supervisory Control and Data Acquisition) systems play a significant role in ICS (Industrial Control System). Safety, security and stable operation is crucial to the SCADA system.
Zhou Xiaojun   +5 more
doaj   +1 more source

Cyber Security in Industrial Control Systems and SCADA Applications: Modbus TCP Protocol Example

open access: yesGazi Üniversitesi Fen Bilimleri Dergisi, 2018
Electrical energy generation, transmission and distribution systems are evaluated in terms of national security dimension and defined as critical infrastructures.
Erdal IRMAK, İsmail ERKEK
doaj   +1 more source

Key management issue in SCADA networks: A review

open access: yesEngineering Science and Technology, an International Journal, 2017
Supervisory Control And Data Acquisition (SCADA) networks have a vital role in Critical Infrastructures (CIs) such as public transports, power generation systems, gas, water and oil industries, so that there are concerns on security issues in these ...
Abdalhossein Rezai   +2 more
doaj   +1 more source

The Sensors Connectivity within SCADA Automation Environment and New Trends for Security Development during Multicasting Routing Transmission

open access: yesInternational Journal of Distributed Sensor Networks, 2015
This study examined the security of SCADA system and its protocols, more specifically, SCADA/DNP3 protocol security. To achieve the study goals, a SCADA simulation environment is designed for water pumping process through connectivity of intelligent ...
Aamir Shahzad   +4 more
doaj   +1 more source

SEABASS: Symmetric-keychain Encryption and Authentication for Building Automation Systems [PDF]

open access: yes, 2018
There is an increasing security risk in Building Automation Systems (BAS) in that its communication is unprotected, resulting in the adversary having the capability to inject spurious commands to the actuators to alter the behaviour of BAS.
Keoh, Sye Loong   +3 more
core   +1 more source

Cyber security of critical infrastructures

open access: yesICT Express, 2018
Modern Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and managing electric power generation, transmission and distribution.
Leandros A. Maglaras   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy