Results 171 to 180 of about 43,505 (220)
Some of the next articles are maybe not open access.

Component-Oriented Architecture for SCADA System

2009 International Conference on Computing, Engineering and Information, 2009
Component-oriented techniques have been increasingly used in software engineering. They have been used to solve distributed computing problems. However, in automation world, these techniques have not been implemented to solve distributed control problems. This paper proposes a component-oriented architecture of Supervisory Control and Data Acquisition (
Phan Duy Anh, Truong Dinh Chau
openaire   +1 more source

Cyber-security of SCADA systems

2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 2012
After a general introduction of the VIKING EU FP7 project two specific cyber-attack mechanisms, which have been analyzed in the VIKING project, will be discussed in more detail. Firstly an attack and its consequences on the Automatic Generation Control (AGC) in a power system are investigated, and secondly the cyber security of State Estimators in ...
Goran Andersson   +8 more
openaire   +1 more source

Integrated SCADA Checkweigher System

2015
The dynamic weighing is a constantly developing field of metrology. The electronic weighing module is vulnerable to many sources of environmental disturbances. Some issues connected with dynamic weighing and the necessity of implementation of signal processing methods are discussed.
Piotr Bazydło, Roman Szewczyk
openaire   +1 more source

Principles of SCADA-system development

2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2018
The paper deals with principles of control software design. Such a software tools are widely used in modern paper production enterprise. Siemens SIMATIC Step-7 environment is implemented for software development (SCADA system (Supervisory Control And Data Acquisition)). Basic concept of program operation could be described as follows: control signal is
Stanislav V. Moshko   +1 more
openaire   +1 more source

Assessment of SCADA System Vulnerabilities

2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019
SCADA system is an essential component for automated control and monitoring in many of the Critical Infrastructures (CI). Cyber-attacks like Stuxnet, Aurora, Maroochy on SCADA systems give us clear insight about the damage a determined adversary can cause to any country’s security, economy, and health-care systems. An in-depth analysis of these attacks
Geeta Yadav, Kolin Paul
openaire   +1 more source

SCADA System Cyber Security

2013
Modern industrial systems (e.g. power plants, water plants, chemical installation, etc.) make large use of information and communication technologies (ICT). In the past years, those systems started to use public networks (i.e. the Internet) for system-to-system interconnection, to provide new features and services.
openaire   +1 more source

Specialized Honeypots for SCADA Systems

2015
In this chapter we examine the role of specialized honeypots for detecting and profiling cyber attacks on SCADA-based Industrial Control Systems, debate how to implement such honeypots and provide a complete example of such an appliance. The honeypot concept has been used in general-purpose intrusion detection systems for a long time, with well ...
Paulo Simões   +3 more
openaire   +1 more source

Beware of SCADA System Vulnerability

Opflow, 2010
This article begins by providing a brief overview of how automated hacking programs exploit computer systems. The article lists the characteristics of an ideal host computer that allow a hacking program to imbed a small remote access and control application, turning the infected computer system into a “zombie” that remains dormant while awaiting ...
Mark Brilliant, Ken Mains
openaire   +1 more source

Securing Light Source SCADA Systems

2018
Proceedings of the 16th Int. Conf.
Mekinda, Leonce   +18 more
openaire   +1 more source

Situational awareness for SCADA systems

Proceedings of the Fifth Cybersecurity Symposium, 2018
As the threat level and attack sophistication increases for supervisory control and data acquisition (SCADA) systems, the need to increase the ability to detect, respond and recover becomes correspondingly important. This paper discusses the methods to gather information and utilize available tools and techniques to increase situational awareness for ...
openaire   +1 more source

Home - About - Disclaimer - Privacy