Results 161 to 170 of about 43,505 (220)
SecuFL-IoT: an adaptive privacy-preserving federated learning framework for anomaly detection in smart industrial networks. [PDF]
Alqazzaz A.
europepmc +1 more source
A CPS-Based Architecture for Mobile Robotics: Design, Integration, and Localisation Experiments. [PDF]
Líšková D, Jadlovská A, Pazdič F.
europepmc +1 more source
SHAP enhanced transformer GWO boosting model for transparent and robust anomaly detection in IIoT environments. [PDF]
Aly M, Alotaibi NM.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Enhancing SCADA System Security
2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS), 2020Today’s Supervisory Control and Data Acquisition (SCADA) networks manage power grids, water and sewer systems, automated factories, and many other complex systems. As these systems have evolved, so have the security challenges they face. We describe our research in strengthening SCADA security through development of a test bed for experimentation ...
Moustapha Fall +4 more
openaire +1 more source
Information Management & Computer Security, 2008
PurposeSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public ...
Sandip C. Patel, Pritimoy Sanyal
openaire +1 more source
PurposeSupervisory control and data acquisition (SCADA) systems are widely used by utility companies during the production and distribution of oil, gas, chemicals, electric power, and water to control and monitor these operations. A cyber attack on a SCADA system cannot only result in a major financial disaster but also in devastating damage to public ...
Sandip C. Patel, Pritimoy Sanyal
openaire +1 more source
Journal AWWA, 1986
A new computer‐based supervisory control and data acquisition (SCADA) system controls and monitors the Honolulu Board of Water Supply's pumping, storage, and distribution operations. Two operator consoles with color CRTs display water system data in symbol form and in trend format and also control pumps and valves at remote stations.
Ronald N. Wada +2 more
openaire +1 more source
A new computer‐based supervisory control and data acquisition (SCADA) system controls and monitors the Honolulu Board of Water Supply's pumping, storage, and distribution operations. Two operator consoles with color CRTs display water system data in symbol form and in trend format and also control pumps and valves at remote stations.
Ronald N. Wada +2 more
openaire +1 more source
Qatar Foundation Annual Research Conference Proceedings Volume 2014 Issue 1, 2014
Abstract: SCADA ( Supervisory control and data acquisition) is a system which allows a control of remote industrial equipments, over a communication channel. These legacy communication channels were designed before the cyber space era,and hence they lack any security measures in their network which makes them vulnerable to any cyber attack.
openaire +1 more source
Abstract: SCADA ( Supervisory control and data acquisition) is a system which allows a control of remote industrial equipments, over a communication channel. These legacy communication channels were designed before the cyber space era,and hence they lack any security measures in their network which makes them vulnerable to any cyber attack.
openaire +1 more source
Integrated view of SCADA [SCADA systems]
6th IET Water Event, 2008A collection of slides from the author's conference presentation is given. This paper presents the SCADA systems for water management. (26 pages)
openaire +1 more source
Bridging SCADA systems and GI systems
2014 IEEE World Forum on Internet of Things (WF-IoT), 2014Supervisory Control and Data Acquisition (SCADA) systems are omnipresent in production operation worldwide. Failure detection within these systems remains a challenging task as the level of granularity in terms of location-based identification is low. The systems are able to identify and display failing components, but the situation becomes even more ...
Simon Back +3 more
openaire +1 more source

