نتایج جستجو برای: scada system
تعداد نتایج: 2231719 فیلتر نتایج به سال:
SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...
Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate, but which can disrupt the industrial process. We believe that it is possible to detect such behavio...
The current situation with supervisory control and information procurement (SCADA) framework security is not similar with the vulnerabilities, dangers as on today and potential results. A large number of the SCADA frameworks are moderately shaky frameworks with endless and inescapable vulnerabilities. Seen data security dangers are once in a while talked about and assessed at administration lev...
This paper presents observations and analysis experienced by a utility end user. As SCADA systems become a crucial part of daily operations for utilities, finding low-cost, reliable communications for substations in remote geographic locations often presents a challenge. Current SCADA communications methods, including framerelay, T1, and fiber are often unreasonably expensive, in terms of insta...
Components of the electric power grid that were traditionally deployed in physically isolated networks, are now using IP based, interconnected networks to transmit Supervisory Control and Data Acquisition (SCADA) messages. SCADA protocols were not designed with security in mind. Therefore, in order to enhance security, access control and risk mitigation, operators need detailed and accurate inf...
Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA e...
Recent advances in low-cost remote monitoring systems have made it possible and practical to perform structural health monitoring (SHM) on a large scale. However, it is difficult for a single remote monitoring system to cover a wide range of SHM applications due to the amount of specialization required. For the remote monitoring system to be flexible, sustainable, and robust, this article intro...
This paper presents the concept of integrated knowledge-based and simulationbased supervisory control for process facilities. Linked to a common SCADA system, such knowledge-based decision procedure, which includes process simulation, assists the operator and facility engineer in operating the facility. The functional chain, which begins with operator knowledge acquisition and moves to knowledg...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید