Results 171 to 180 of about 43,505 (220)
Some of the next articles are maybe not open access.
Component-Oriented Architecture for SCADA System
2009 International Conference on Computing, Engineering and Information, 2009Component-oriented techniques have been increasingly used in software engineering. They have been used to solve distributed computing problems. However, in automation world, these techniques have not been implemented to solve distributed control problems. This paper proposes a component-oriented architecture of Supervisory Control and Data Acquisition (
Phan Duy Anh, Truong Dinh Chau
openaire +1 more source
Cyber-security of SCADA systems
2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 2012After a general introduction of the VIKING EU FP7 project two specific cyber-attack mechanisms, which have been analyzed in the VIKING project, will be discussed in more detail. Firstly an attack and its consequences on the Automatic Generation Control (AGC) in a power system are investigated, and secondly the cyber security of State Estimators in ...
Goran Andersson +8 more
openaire +1 more source
Integrated SCADA Checkweigher System
2015The dynamic weighing is a constantly developing field of metrology. The electronic weighing module is vulnerable to many sources of environmental disturbances. Some issues connected with dynamic weighing and the necessity of implementation of signal processing methods are discussed.
Piotr Bazydło, Roman Szewczyk
openaire +1 more source
Principles of SCADA-system development
2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus), 2018The paper deals with principles of control software design. Such a software tools are widely used in modern paper production enterprise. Siemens SIMATIC Step-7 environment is implemented for software development (SCADA system (Supervisory Control And Data Acquisition)). Basic concept of program operation could be described as follows: control signal is
Stanislav V. Moshko +1 more
openaire +1 more source
Assessment of SCADA System Vulnerabilities
2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), 2019SCADA system is an essential component for automated control and monitoring in many of the Critical Infrastructures (CI). Cyber-attacks like Stuxnet, Aurora, Maroochy on SCADA systems give us clear insight about the damage a determined adversary can cause to any country’s security, economy, and health-care systems. An in-depth analysis of these attacks
Geeta Yadav, Kolin Paul
openaire +1 more source
2013
Modern industrial systems (e.g. power plants, water plants, chemical installation, etc.) make large use of information and communication technologies (ICT). In the past years, those systems started to use public networks (i.e. the Internet) for system-to-system interconnection, to provide new features and services.
openaire +1 more source
Modern industrial systems (e.g. power plants, water plants, chemical installation, etc.) make large use of information and communication technologies (ICT). In the past years, those systems started to use public networks (i.e. the Internet) for system-to-system interconnection, to provide new features and services.
openaire +1 more source
Specialized Honeypots for SCADA Systems
2015In this chapter we examine the role of specialized honeypots for detecting and profiling cyber attacks on SCADA-based Industrial Control Systems, debate how to implement such honeypots and provide a complete example of such an appliance. The honeypot concept has been used in general-purpose intrusion detection systems for a long time, with well ...
Paulo Simões +3 more
openaire +1 more source
Beware of SCADA System Vulnerability
Opflow, 2010This article begins by providing a brief overview of how automated hacking programs exploit computer systems. The article lists the characteristics of an ideal host computer that allow a hacking program to imbed a small remote access and control application, turning the infected computer system into a “zombie” that remains dormant while awaiting ...
Mark Brilliant, Ken Mains
openaire +1 more source
Securing Light Source SCADA Systems
2018Proceedings of the 16th Int. Conf.
Mekinda, Leonce +18 more
openaire +1 more source
Situational awareness for SCADA systems
Proceedings of the Fifth Cybersecurity Symposium, 2018As the threat level and attack sophistication increases for supervisory control and data acquisition (SCADA) systems, the need to increase the ability to detect, respond and recover becomes correspondingly important. This paper discusses the methods to gather information and utilize available tools and techniques to increase situational awareness for ...
openaire +1 more source

