Results 31 to 40 of about 43,505 (220)
Trends in modern SCADA systems [PDF]
Modern production processes request modern solutions in the field of control and supervision. As present SCADA (Supervisory Control And Data Acquisition) systems are based on computer and communication technologies, they are also high influenced with ...
Bugarski Vladimir +4 more
doaj
SIMULASI APLIKASI SUPERVISORY AND DATA ACQUISITION (SCADA) PADA PENGATURAN LEVEL AIR DENGAN WINLOG
SCADA (Supervisory Control And Data Aquisition) merupakan hasil pengintegrasian komponen otomasi yang digunakan untuk memonitor dan mengontrol proses yang terjadi di lapangan yang mempunyai kemampuan menyajikan informasi dan kontrol secara realtime yang ...
Diana Rahmawati
doaj +1 more source
Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems [PDF]
Industrial Control Systems (ICS) and SCADA (Supervisory Control And Data Acquisition) applications monitor and control a wide range of safety-related functions.
Evangelopoulou, Maria +2 more
core +2 more sources
The vigorous development of the Industrial Internet of Things brings the advanced connection function of the new generation of industrial automation and control systems.
Yu-Sheng Yang +5 more
doaj +1 more source
Smart grid architecture for rural distribution networks: application to a Spanish pilot network [PDF]
This paper presents a novel architecture for rural distribution grids. This architecture is designed to modernize traditional rural networks into new Smart Grid ones.
Díaz González, Francisco +4 more
core +3 more sources
DESIGN AND IMPLEMENTATION OF APPLICATION PROGRAMMODULE FOR A POWER STATION SCADA SYSTEM
Supervisory Control And Data Acquisition (SCADA) is a commonly used industry term for computer based system allowing system operators to obtain real-time data related to the status of an electric power system over wide geographic area.the designed SCADA
Assmaa A. Fahad
doaj +1 more source
Securing SCADA Energy Management System under DDos Attacks Using Token Verification Approach
The advanced connection requirements of industrial automation and control systems have sparked a new revolution in the Industrial Internet of Things (IIoT), and the Supervisory Control and Data Acquisition (SCADA) network has evolved into an open and ...
Yu-Sheng Yang +5 more
doaj +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Analysis of ICS and SCADA Systems Attacks Using Honeypots
Supervisory control and data acquisition (SCADA) attacks have increased due to the digital transformation of many industrial control systems (ICS). Operational technology (OT) operators should use the defense-in-depth concept to secure their operations ...
Mohamed Mesbah +3 more
doaj +1 more source
The proposed hybrid osprey‐salp swarm optimization algorithm addresses optimal power flow (OPF) problems in smart grids incorporating solar, hydro, and thermal generators. The algorithm is validated on Institute of Electrical and Electronics Engineers 30‐, 57‐, and 118‐bus test systems across five single and multiobjective OPF scenarios.
Mujtaba Ali +5 more
wiley +1 more source

