NUK - logo

Rezultati iskanja

Osnovno iskanje    Izbirno iskanje   
Iskalna
zahteva
Knjižnica

Trenutno NISTE avtorizirani za dostop do e-virov NUK. Za polni dostop se PRIJAVITE.

1 2 3 4 5
zadetkov: 5.647
21.
  • Inclusion of SCADA Cyber Vu... Inclusion of SCADA Cyber Vulnerability in Power System Reliability Assessment Considering Optimal Resources Allocation
    Zhang, Yichi; Wang, Lingfeng; Xiang, Yingmeng ... IEEE transactions on power systems, 2016-Nov., 2016-11-00, 20161101, Letnik: 31, Številka: 6
    Journal Article
    Recenzirano
    Odprti dostop

    With sufficient resources, attackers might be able to intrude into multiple substation-level networks of the supervisory control and data acquisition (SCADA) system and send fabricated commands to ...
Celotno besedilo

PDF
22.
  • Early anomaly detection and... Early anomaly detection and localisation in distribution network: a data-driven approach
    Shi, Xin; Qiu, Robert; He, Xing ... IET generation, transmission & distribution, 09/2020, Letnik: 14, Številka: 18
    Journal Article
    Recenzirano
    Odprti dostop

    The measurement data collected from the supervisory control and data acquisition (SCADA) system installed in distribution network can reflect the operational state of the network effectively. In this ...
Celotno besedilo

PDF
23.
  • Using SCADA data for wind t... Using SCADA data for wind turbine condition monitoring – a review
    Tautz-Weinert, Jannis; Watson, Simon J IET renewable power generation, 03/2017, Letnik: 11, Številka: 4
    Journal Article
    Recenzirano
    Odprti dostop

    The ever increasing size of wind turbines and the move to build them offshore have accelerated the need for optimised maintenance strategies in order to reduce operating costs. Predictive maintenance ...
Celotno besedilo

PDF
24.
  • Efficient Coordination of W... Efficient Coordination of Wind Power and Price-Responsive Demand-Part I: Theoretical Foundations
    Ilic, M. D.; Le Xie; Jhi-Young Joo IEEE transactions on power systems, 11/2011, Letnik: 26, Številka: 4
    Journal Article
    Recenzirano

    In Part I of this two-part paper, we introduce several possible methods for integrating wind power, price-responsive demand and other distributed energy resources (DERs). These methods differ with ...
Celotno besedilo
25.
  • Energy Consumption Analysis... Energy Consumption Analysis in SCADA: A Case Study in the Glass Container Industry
    Ponte, Raquel; Pinto, Rui; Meireles, Tiago Procedia computer science, 2024, 2024-00-00, Letnik: 237
    Journal Article
    Recenzirano
    Odprti dostop

    Given the present geopolitical scenario and global energy crisis, there is a growing demand to cut energy use, particularly in industry. The glass package manufacturing business has been severely hit ...
Celotno besedilo
26.
  • Detection and Differentiati... Detection and Differentiation of Replay Attack and Equipment Faults in SCADA Systems
    Li, Dan; Gebraeel, Nagi; Paynabar, Kamran IEEE transactions on automation science and engineering, 2021-Oct., 2021-10-00, Letnik: 18, Številka: 4
    Journal Article

    Supervisory control and data acquisition (SCADA) systems are widely used for industrial control of critical infrastructures, such as power plants and manufacturing systems. There is abundant evidence ...
Celotno besedilo
27.
  • An unsupervised anomaly-bas... An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
    Almalawi, Abdulmohsen; Yu, Xinghuo; Tari, Zahir ... Computers & security, 10/2014, Letnik: 46
    Journal Article
    Recenzirano

    Supervisory Control and Data Acquisition (SCADA) systems are a core part of industrial systems, such as smart grid power and water distribution systems. In recent years, such systems become highly ...
Celotno besedilo
28.
  • Integrated OCSVM mechanism ... Integrated OCSVM mechanism for intrusion detection in SCADA systems
    Maglaras, Leandros A; Jiang, Jianmin; Cruz, Tiago Electronics letters, 12/2014, Letnik: 50, Številka: 25
    Journal Article
    Recenzirano
    Odprti dostop

    Intrusion detection in real-time systems is a problem without a profound solution. In supervisory control and data acquisition (SCADA) systems the absence of a defence mechanism that can cope with ...
Celotno besedilo
29.
  • Multiattribute SCADA-Specif... Multiattribute SCADA-Specific Intrusion Detection System for Power Networks
    Yang, Y.; McLaughlin, K.; Sezer, S. ... IEEE transactions on power delivery, 06/2014, Letnik: 29, Številka: 3
    Journal Article
    Recenzirano
    Odprti dostop

    The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential ...
Celotno besedilo

PDF
30.
  • Vulnerability Assessment of... Vulnerability Assessment of Cybersecurity for SCADA Systems
    Chee-Wooi Ten; Chen-Ching Liu; Manimaran, G. IEEE transactions on power systems, 11/2008, Letnik: 23, Številka: 4
    Journal Article
    Recenzirano

    Vulnerability assessment is a requirement of NERC's cybersecurity standards for electric power systems. The purpose is to study the impact of a cyber attack on supervisory control and data ...
Celotno besedilo
1 2 3 4 5
zadetkov: 5.647

Nalaganje filtrov