نتایج جستجو برای: scada system

تعداد نتایج: 2231719  

2013
S. L. P. Yasakethu J. Jiang

SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...

2010
Dina Hadziosmanovic Damiano Bolzoni Pieter H. Hartel

Standard approaches for detecting malicious behaviors, e.g. monitoring network traffic, cannot address process-related threats in SCADA(Supervisory Control And Data Acquisition) systems. These threats take place when an attacker gains user access rights and performs actions which look legitimate, but which can disrupt the industrial process. We believe that it is possible to detect such behavio...

Journal: :Izvestiâ vysših učebnyh zavedenij. Priborostroenie 2015

2017
Nazmul Hossain Md. Alam Hossain Taposh Das Md. Tariqul Islam

The current situation with supervisory control and information procurement (SCADA) framework security is not similar with the vulnerabilities, dangers as on today and potential results. A large number of the SCADA frameworks are moderately shaky frameworks with endless and inescapable vulnerabilities. Seen data security dangers are once in a while talked about and assessed at administration lev...

2007
James W. Rice Nicholas C. Seeley

This paper presents observations and analysis experienced by a utility end user. As SCADA systems become a crucial part of daily operations for utilities, finding low-cost, reliable communications for substations in remote geographic locations often presents a challenge. Current SCADA communications methods, including framerelay, T1, and fiber are often unreasonably expensive, in terms of insta...

2011
Anastasia Mavridou Mauricio Papa

Components of the electric power grid that were traditionally deployed in physically isolated networks, are now using IP based, interconnected networks to transmit Supervisory Control and Data Acquisition (SCADA) messages. SCADA protocols were not designed with security in mind. Therefore, in order to enhance security, access control and risk mitigation, operators need detailed and accurate inf...

2009
Nils Kalstad Svendsen Stephen D. Wolthusen

Supervisory control and data acquisition (SCADA) systems are increasingly used to operate critical infrastructure assets. However, the inclusion of advanced information technology and communications components and elaborate control strategies in SCADA systems increase the threat surface for external and subversion-type attacks. The problems are exacerbated by site-specific properties of SCADA e...

2013
Sehwan Kim Marco Torbol H. Chou

Recent advances in low-cost remote monitoring systems have made it possible and practical to perform structural health monitoring (SHM) on a large scale. However, it is difficult for a single remote monitoring system to cover a wide range of SHM applications due to the amount of specialization required. For the remote monitoring system to be flexible, sustainable, and robust, this article intro...

Journal: :Proceedings of International Conference on Artificial Life and Robotics 2018

2006
Gerhard Schreck Alexei Lisounkin Jörg Krüger

This paper presents the concept of integrated knowledge-based and simulationbased supervisory control for process facilities. Linked to a common SCADA system, such knowledge-based decision procedure, which includes process simulation, assists the operator and facility engineer in operating the facility. The functional chain, which begins with operator knowledge acquisition and moves to knowledg...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید