Results 81 to 90 of about 20,660 (211)
Cyber Security Maintenance for SCADA Systems
To ensure a high security level in industrial systems over a period of time, maintenance is required. In this paper, we give an overview of security-related maintenance tasks incorporating new technologies employed in industrial control systems such as cloud computing but also new attack technologies such as GPS spoofing. We also provide a threat model
Johannes Schneider 0002 +2 more
openaire +1 more source
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley +1 more source
Uncovering Vulnerable Industrial Control Systems from the Internet Core
Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication.
Nawrocki, Marcin +2 more
core +1 more source
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley +1 more source
Supervisory control and data acquisition (SCADA) systems play a crucial role in managing vital infrastructures, including power generation, distribution networks, waste management, and smart manufacturing.
Mehmet Yavuz Yağcı +2 more
doaj +1 more source
FIRE: A Human‐Centered Framework for Digital Twin Design
ABSTRACT The integration of human perspectives into digital twin (DT) design for sociotechnical systems (STS) is essential for addressing the complex relationship between social and technical elements. Despite advances in DT technology, its application to STS demands a human‐centered approach that considers usability, user experience, and contextual ...
Dimitri Masson, Eric Villeneuve
wiley +1 more source
Real‐Time Cyberattack Detection for SCADA in Power System
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi +2 more
doaj +1 more source
Industrial systems always prefer to reduce their operational expenses. To support such reductions, they need solutions that are capable of providing stability, fault tolerance, and flexibility.
Anam Sajid, Haider Abbas, Kashif Saleem
doaj +1 more source
A survey of intrusion detection system technologies [PDF]
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting ...
Heenan, Ross, Moradpoor, Naghmeh
core

