NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 5.668
11.
  • SCADA (Supervisory Control ... SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations
    Upadhyay, Darshana; Sampalli, Srinivas Computers & security, February 2020, 2020-02-00, 20200201, Letnik: 89
    Journal Article
    Recenzirano

    •Supervisory Control and Data Acquisition (SCADA) is used for control and monitoring of industrial process automation.•Growing interconnectivity and remote accessibility make SCADA networks ...
Celotno besedilo
12.
  • Security issues in SCADA ne... Security issues in SCADA networks
    Igure, Vinay M.; Laughter, Sean A.; Williams, Ronald D. Computers & security, 10/2006, Letnik: 25, Številka: 7
    Journal Article
    Recenzirano

    The increasing interconnectivity of SCADA (Supervisory Control and Data Acquisition) networks has exposed them to a wide range of network security problems. This paper provides an overview of all the ...
Celotno besedilo
13.
  • Middleware for Internet of ... Middleware for Internet of Things: A Survey
    Razzaque, Mohammad Abdur; Milojevic-Jevric, Marija; Palade, Andrei ... IEEE internet of things journal, 2016-Feb., 2016-2-00, 20160201, Letnik: 3, Številka: 1
    Journal Article
    Odprti dostop

    The Internet of Things (IoT) envisages a future in which digital and physical things or objects (e.g., smartphones, TVs, cars) can be connected by means of suitable information and communication ...
Celotno besedilo

PDF
14.
  • Condition Monitoring of Win... Condition Monitoring of Wind Turbine Generators Using SCADA Data Analysis
    Jin, Xiaohang; Xu, Zhuangwei; Qiao, Wei IEEE transactions on sustainable energy, 2021-Jan., 2021-1-00, 20210101, Letnik: 12, Številka: 1
    Journal Article
    Recenzirano

    Utility-scale wind turbines are equipped with a supervisory control and data acquisition (SCADA) system for remote supervision and control. The SCADA system accumulates a large amount of data that ...
Celotno besedilo
15.
  • Cyber Security of Water SCA... Cyber Security of Water SCADA Systems-Part I: Analysis and Experimentation of Stealthy Deception Attacks
    Amin, Saurabh; Litrico, Xavier; Sastry, Shankar ... IEEE transactions on control systems technology, 2013-Sept., 2013-09-00, 20130901, Letnik: 21, Številka: 5
    Journal Article
    Recenzirano

    This brief aims to perform security threat assessment of networked control systems with regulatory and supervisory control layers. We analyze the performance of a proportional-integral controller ...
Celotno besedilo
16.
  • A Multidimensional Critical... A Multidimensional Critical State Analysis for Detecting Intrusions in SCADA Systems
    Carcano, A; Coletta, A; Guglielmi, M ... IEEE transactions on industrial informatics 7, Številka: 2
    Journal Article

    A relatively new trend in Critical Infrastructures (e.g., power plants, nuclear plants, energy grids, etc.) is the massive migration from the classic model of isolated systems, to a system-of-systems ...
Celotno besedilo
17.
  • A generalized model for win... A generalized model for wind turbine anomaly identification based on SCADA data
    Sun, Peng; Li, Jian; Wang, Caisheng ... Applied energy, 04/2016, Letnik: 168
    Journal Article
    Recenzirano
    Odprti dostop

    •A generalized model is presented for wind turbine anomaly identification.•Prediction models are developed for the environmentally sensitive SCADA parameters.•A new index is defined to quantify the ...
Celotno besedilo

PDF
18.
  • SCADA security in the light... SCADA security in the light of Cyber-Warfare
    Nicholson, A.; Webber, S.; Dyer, S. ... Computers & security, June 2012, 2012-6-00, 20120601, Letnik: 31, Številka: 4
    Journal Article
    Recenzirano

    Supervisory Control and Data Acquisition (SCADA) systems are deployed worldwide in many critical infrastructures ranging from power generation, over public transport to industrial manufacturing ...
Celotno besedilo
19.
  • Runtime Semantic Security A... Runtime Semantic Security Analysis to Detect and Mitigate Control-Related Attacks in Power Grids
    Hui Lin; Slagell, Adam; Kalbarczyk, Zbigniew T. ... IEEE transactions on smart grid, 2018-Jan., 2018-1-00, 2018-01-01, Letnik: 9, Številka: 1
    Journal Article
    Recenzirano
    Odprti dostop

    In this paper, we analyze control-related attacks in supervisory control and data acquisition systems for power grids. This class of attacks introduces a serious threat to power systems, because ...
Celotno besedilo

PDF
20.
  • A safety/security risk anal... A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie – combining new version of attack tree with bowtie analysis
    Abdo, H.; Kaouk, M.; Flaus, J.-M. ... Computers & security, 01/2018, Letnik: 72
    Journal Article
    Recenzirano
    Odprti dostop

    The introduction of connected systems and digital technology in process industries creates new cyber-security vulnerabilities that can be exploited by sophisticated threats and lead to undesirable ...
Celotno besedilo

PDF
1 2 3 4 5
zadetkov: 5.668

Nalaganje filtrov