Academic literature on the topic 'IDS SCADA'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IDS SCADA.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IDS SCADA"
Syamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textArifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textCruz, Tiago, Jorge Proença, Paulo Simões, et al. "A Distributed IDS for Industrial Control Systems." International Journal of Cyber Warfare and Terrorism 4, no. 2 (2014): 1–22. http://dx.doi.org/10.4018/ijcwt.2014040101.
Full textD'Aquino, Anderson Mussel, Luiz Fernando Rust da Costa Carmo, Luci Pirmez, and Claudio Miceli de Farias. "IBEMCS: IDS BASEADO EM EVENTOS MULTI-CONTEXTO PARA SCADA / IBEMCS: EVENT BASED IDS MULTI-CONTEXT FOR SCADA." Brazilian Journal of Development 7, no. 1 (2021): 3975–92. http://dx.doi.org/10.34117/bjdv7n1-269.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textBalla, Asaad, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, Md Rafiqul Islam, and F. M. Suliman. "The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems." Sensors 23, no. 2 (2023): 758. http://dx.doi.org/10.3390/s23020758.
Full textKhadidos, Alaa O., Hariprasath Manoharan, Shitharth Selvarajan, Adil O. Khadidos, Khaled H. Alyoubi, and Ayman Yafoz. "A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security." Energies 15, no. 10 (2022): 3624. http://dx.doi.org/10.3390/en15103624.
Full textSangeetha K., Shitharth S., and Gouse Baig Mohammed. "Enhanced SCADA IDS Security by Using MSOM Hybrid Unsupervised Algorithm." International Journal of Web-Based Learning and Teaching Technologies 17, no. 2 (2022): 1–9. http://dx.doi.org/10.4018/ijwltt.20220301.oa2.
Full textAltaha, Mustafa, and Sugwon Hong. "Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol." Electronics 11, no. 14 (2022): 2184. http://dx.doi.org/10.3390/electronics11142184.
Full textNguyen, Van Xuan. "DETECTING ATTACKS ON SCADA SYSTEMS BASED ON MLP NEURAL NETWORK AND CONTEXT OF DATA." Journal of Science and Technique 15, no. 2 (2020): 98–110. http://dx.doi.org/10.56651/lqdtu.jst.v15.n02.146.
Full textDissertations / Theses on the topic "IDS SCADA"
Fahlström, Albin, and Victor Henriksson. "Intrångsdetektering i processnätverk." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39881.
Full textKuchař, Karel. "Vhodná strategie pro detekci bezpečnostních incidentů v průmyslových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-412978.
Full textŠevčík, Michal. "Návrh monitoringu kritické komunikační infrastruktury pro energetickou společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378335.
Full textHansen, Sinclair D. "An intrusion detection system for supervisory control and data acquisition systems." Thesis, Queensland University of Technology, 2008. https://eprints.qut.edu.au/16636/1/Sinclair_Hansen_Thesis.pdf.
Full textHansen, Sinclair D. "An intrusion detection system for supervisory control and data acquisition systems." Queensland University of Technology, 2008. http://eprints.qut.edu.au/16636/.
Full textMareček, Matěj. "IDE for SCADA Development at CERN." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255482.
Full textVáňa, Martin. "Kybernetické prostředí pro systémy typu ICS/SCADA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400894.
Full textAlbinsson, Felix, and Jesper Riedl. "HONEYPOT – To bee or not to bee: A study of attacks on ICS/SCADA systems." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-54563.
Full textXu, Hao. "WINCC SCADA system via profibus & OPC." Thesis, Xu, Hao (2013) WINCC SCADA system via profibus & OPC. Other thesis, Murdoch University, 2013. https://researchrepository.murdoch.edu.au/id/eprint/21651/.
Full textMyers, David. "Detecting cyber attacks on industrial control systems using process mining." Thesis, Queensland University of Technology, 2019. https://eprints.qut.edu.au/130799/1/David_Myers_Thesis.pdf.
Full textBooks on the topic "IDS SCADA"
author, Singer Bryan L., Shbeeb Aaron author, Hilt Stephen author, and Wilhoit Kyle author, eds. Hacking exposed industrial control systems: ICS and SCADA security secrets & solutions. McGraw-Hill Education, 2017.
Find full textJones, Kevin, Helge Janicke, and Thomas Brandstetter. 4th International Symposium for ICS and SCADA Cyber Security Research 2016. BCS Learning & Development Limited, 2016.
Find full textSinger, Bryan, Clint Bodungen, Aaron Shbeeb, Kyle Wilhoit, and Stephen Hilt. Hacking Exposed Industrial Control Systems: ICS and Scada Security Secrets and Solutions. McGraw-Hill Education, 2016.
Find full textBook chapters on the topic "IDS SCADA"
Bayou, Lyes, David Espes, Nora Cuppens-Boulahia, and Frédéric Cuppens. "wIDS: A Multilayer IDS for Wireless-Based SCADA Systems." In Information Systems Security. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-72598-7_24.
Full textShitharth, S., N. Satheesh, B. Praveen Kumar, and K. Sangeetha. "IDS Detection Based on Optimization Based on WI-CS and GNN Algorithm in SCADA Network." In Architectural Wireless Networks Solutions and Security Issues. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-0386-0_14.
Full textStrohmier, Hala, Aaryan R. Londhe, Chris A. Clark, Ronit Pawar, and Brian Kram. "Exploring ICS/SCADA Network Vulnerabilities." In HCI for Cybersecurity, Privacy and Trust. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-61382-1_14.
Full textAli, Saqib, Taiseera Al Balushi, Zia Nadir, and Omar Khadeer Hussain. "ICS/SCADA System Security for CPS." In Studies in Computational Intelligence. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75880-0_5.
Full textGaiceanu, Marian, Marilena Stanculescu, Paul Cristian Andrei, Vasile Solcanu, Theodora Gaiceanu, and Horia Andrei. "Intrusion Detection on ICS and SCADA Networks." In Recent Developments on Industrial Control Systems Resilience. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31328-9_10.
Full textKim, Byoung-Koo, Dong-Ho Kang, Jung-Chan Na, and Tai-Myoung Chung. "Detecting Abnormal Behavior in SCADA Networks Using Normal Traffic Pattern Learning." In Computer Science and its Applications. Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-45402-2_18.
Full textChaudhry, Junaid, Uvais Qidwai, and Mahdi H. Miraz. "Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-23943-5_6.
Full textRadaković, Nataša, and Ivana Šenk. "Deep Autoencoder Based Leakage Detection in Water Distribution SCADA Systems." In Proceedings on 18th International Conference on Industrial Systems – IS’20. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-97947-8_47.
Full textGuo, Youqiang, Zijun Zhang, and Xuezhu Pei. "A Research on Instability of Small Flow in SCADA and an Optimizing Design for Control." In Computational Science and Its Applications – ICCSA 2009. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-02457-3_55.
Full textMaglaras, Leandros, Helge Janicke, Jianmin Jiang, and Andrew Crampton. "Novel Intrusion Detection Mechanism with Low Overhead for SCADA Systems." In Securing the Internet of Things. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9866-4.ch017.
Full textConference papers on the topic "IDS SCADA"
Rubin, Benny, Ali Tekeoglu, and Christopher Rouff. "Autonomic Passive IT-OT Device Classification in ICS/SCADA Networks." In 2024 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2024. http://dx.doi.org/10.1109/csr61664.2024.10679418.
Full textR, Senthilprabha, Dharini V, Jyothika G, and Shophiya K. "Performance Measure of IDS in the SCADA Systems." In Proceedings of the First International Conference on Combinatorial and Optimization, ICCAP 2021, December 7-8 2021, Chennai, India. EAI, 2021. http://dx.doi.org/10.4108/eai.7-12-2021.2314694.
Full textD’Aquino, Anderson Mussel, Luiz Fernando Rust da Costa Carmo, Luci Pirmez, and Claudio Miceli. "IBEMCS: IDS Baseado em Eventos Multi-Contexto para SCADA." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2016. http://dx.doi.org/10.5753/sbseg.2016.19302.
Full textVerba, Jared, and Michael Milvich. "Idaho National Laboratory Supervisory Control and Data Acquisition Intrusion Detection System (SCADA IDS)." In 2008 IEEE Conference on Technologies for Homeland Security. IEEE, 2008. http://dx.doi.org/10.1109/ths.2008.4534498.
Full textChen, Yenan, Linsen Li, Zhaoqian Zhu, and Yue Wu. "Work-in-Progress: Reliability Evaluation of Power SCADA System with Three-Layer IDS." In 2022 International Conference on Compilers, Architecture, and Synthesis for Embedded Systems (CASES). IEEE, 2022. http://dx.doi.org/10.1109/cases55004.2022.00007.
Full textVasquez, Gabriel, Rodrigo S. Miani, and Bruno B. Zarpelão. "Flow-Based Intrusion Detection for SCADA networks using Supervised Learning." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2017. http://dx.doi.org/10.5753/sbseg.2017.19498.
Full textOuyang, Yuankai, Beibei Li, Qinglei Kong, Han Song, and Tao Li. "FS-IDS: A Novel Few-Shot Learning Based Intrusion Detection System for SCADA Networks." In ICC 2021 - IEEE International Conference on Communications. IEEE, 2021. http://dx.doi.org/10.1109/icc42927.2021.9500667.
Full textEden, Peter, Andrew Blyth, Pete Burnap, et al. "Forensic Readiness for SCADA/ICS Incident Response." In 4th International Symposium for ICS & SCADA Cyber Security Research 2016. BCS Learning & Development, 2016. http://dx.doi.org/10.14236/ewic/ics2016.16.
Full textNicholson, Andrew, Helge Janicke, and Antonio Cau. "Safety and Security Monitoring in ICS/SCADA Systems." In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. BCS Learning & Development, 2014. http://dx.doi.org/10.14236/ewic/ics-csr2014.9.
Full textGreen, Benjamin, Daniel Prince, Utz Roedig, Jerry Busby, and David Hutchison. "Socio-Technical Security Analysis of Industrial Control Systems (ICS)." In 2nd International Symposium for ICS & SCADA Cyber Security Research 2014. BCS Learning & Development, 2014. http://dx.doi.org/10.14236/ewic/ics-csr2014.2.
Full textReports on the topic "IDS SCADA"
Stouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, 2013. http://dx.doi.org/10.6028/nist.sp.800-82r1.
Full textStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security - Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800.82.
Full textStouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) security : Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC) : recommendations of the National Institute of Standards and Technology, Computer security. National Institute of Standards and Technology, 2011. http://dx.doi.org/10.6028/nist.sp.800-82.
Full textLindig, Sascha, Julien Deckx, Magnus Herz, et al. Technical Key Performance Indicators for Photovoltaic Systems: Challenges and Best Practices. International Energy Agency Photovoltaic Power Systems Programme, 2024. https://doi.org/10.69766/luzi3108.
Full text