Results 81 to 90 of about 20,660 (211)

Cyber Security Maintenance for SCADA Systems

open access: yesElectronic Workshops in Computing, 2015
To ensure a high security level in industrial systems over a period of time, maintenance is required. In this paper, we give an overview of security-related maintenance tasks incorporating new technologies employed in industrial control systems such as cloud computing but also new attack technologies such as GPS spoofing. We also provide a threat model
Johannes Schneider 0002   +2 more
openaire   +1 more source

Blockchain and Quantum Technologies for Securing the Global Nuclear Supply Chain: Synergies, Applications, Technical Challenges and Opportunities

open access: yesJournal of Critical Infrastructure Policy, Volume 7, Issue 1, Spring/Summer 2026.
ABSTRACT The infiltration of counterfeit, fraudulent, and suspect items into civil nuclear supply chains, notably within power generation and medical isotope production, poses severe safety and security threats. The ever‐increasing growth in nuclear installations (70 power plants are under construction and another 100 are in the planning stage) and the
Hafiz Ahmed
wiley   +1 more source

Uncovering Vulnerable Industrial Control Systems from the Internet Core

open access: yes, 2019
Industrial control systems (ICS) are managed remotely with the help of dedicated protocols that were originally designed to work in walled gardens. Many of these protocols have been adapted to Internet transport and support wide-area communication.
Nawrocki, Marcin   +2 more
core   +1 more source

A Survey of SIR‐Based Differential Epidemic Models for Control and Security Against Malware Propagation in Computer Networks

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Unarguably, malware and their variants have metamorphosed into objects of attack and cyber warfare. These issues have directed research focus to modeling infrastructural settings and infection scenarios, analyzing propagation mechanisms, and conducting studies that highlight optimized remedial measures.
Chukwunonso Henry Nwokoye
wiley   +1 more source

From Traditional to IoT Based: A Generational Taxonomy and Attack Classification of Supervisory Control and Data Acquisition Syste

open access: yesElectrica
Supervisory control and data acquisition (SCADA) systems play a crucial role in managing vital infrastructures, including power generation, distribution networks, waste management, and smart manufacturing.
Mehmet Yavuz Yağcı   +2 more
doaj   +1 more source

FIRE: A Human‐Centered Framework for Digital Twin Design

open access: yesSystems Engineering, Volume 29, Issue 1, Page 34-48, January 2026.
ABSTRACT The integration of human perspectives into digital twin (DT) design for sociotechnical systems (STS) is essential for addressing the complex relationship between social and technical elements. Despite advances in DT technology, its application to STS demands a human‐centered approach that considers usability, user experience, and contextual ...
Dimitri Masson, Eric Villeneuve
wiley   +1 more source

Real‐Time Cyberattack Detection for SCADA in Power System

open access: yesIET Energy Systems Integration
Supervisory Control and Data Acquisition (SCADA) systems monitor and control industrial processes, but their integration with information technology and network connectivity, including the internet, exposes them to potential cyber threats.
Botta Prudhvi   +2 more
doaj   +1 more source

Cloud-Assisted IoT-Based SCADA Systems Security: A Review of the State of the Art and Future Challenges

open access: yesIEEE Access, 2016
Industrial systems always prefer to reduce their operational expenses. To support such reductions, they need solutions that are capable of providing stability, fault tolerance, and flexibility.
Anam Sajid, Haider Abbas, Kashif Saleem
doaj   +1 more source

A survey of intrusion detection system technologies [PDF]

open access: yes, 2016
This paper provides an overview of IDS types and how they work as well as configuration considerations and issues that affect them. Advanced methods of increasing the performance of an IDS are explored such as specification based IDS for protecting ...
Heenan, Ross, Moradpoor, Naghmeh
core  

Home - About - Disclaimer - Privacy