Journal articles on the topic 'IDS SCADA'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IDS SCADA.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Syamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textArifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textCruz, Tiago, Jorge Proença, Paulo Simões, et al. "A Distributed IDS for Industrial Control Systems." International Journal of Cyber Warfare and Terrorism 4, no. 2 (2014): 1–22. http://dx.doi.org/10.4018/ijcwt.2014040101.
Full textD'Aquino, Anderson Mussel, Luiz Fernando Rust da Costa Carmo, Luci Pirmez, and Claudio Miceli de Farias. "IBEMCS: IDS BASEADO EM EVENTOS MULTI-CONTEXTO PARA SCADA / IBEMCS: EVENT BASED IDS MULTI-CONTEXT FOR SCADA." Brazilian Journal of Development 7, no. 1 (2021): 3975–92. http://dx.doi.org/10.34117/bjdv7n1-269.
Full textKrishnan Sadhasivan, Dhanalakshmi, and Kannapiran Balasubramanian. "A Fusion of Multiagent Functionalities for Effective Intrusion Detection System." Security and Communication Networks 2017 (2017): 1–15. http://dx.doi.org/10.1155/2017/6216078.
Full textBalla, Asaad, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, Md Rafiqul Islam, and F. M. Suliman. "The Effect of Dataset Imbalance on the Performance of SCADA Intrusion Detection Systems." Sensors 23, no. 2 (2023): 758. http://dx.doi.org/10.3390/s23020758.
Full textKhadidos, Alaa O., Hariprasath Manoharan, Shitharth Selvarajan, Adil O. Khadidos, Khaled H. Alyoubi, and Ayman Yafoz. "A Classy Multifacet Clustering and Fused Optimization Based Classification Methodologies for SCADA Security." Energies 15, no. 10 (2022): 3624. http://dx.doi.org/10.3390/en15103624.
Full textSangeetha K., Shitharth S., and Gouse Baig Mohammed. "Enhanced SCADA IDS Security by Using MSOM Hybrid Unsupervised Algorithm." International Journal of Web-Based Learning and Teaching Technologies 17, no. 2 (2022): 1–9. http://dx.doi.org/10.4018/ijwltt.20220301.oa2.
Full textAltaha, Mustafa, and Sugwon Hong. "Anomaly Detection for SCADA System Security Based on Unsupervised Learning and Function Codes Analysis in the DNP3 Protocol." Electronics 11, no. 14 (2022): 2184. http://dx.doi.org/10.3390/electronics11142184.
Full textNguyen, Van Xuan. "DETECTING ATTACKS ON SCADA SYSTEMS BASED ON MLP NEURAL NETWORK AND CONTEXT OF DATA." Journal of Science and Technique 15, no. 2 (2020): 98–110. http://dx.doi.org/10.56651/lqdtu.jst.v15.n02.146.
Full textBalla, Asaad, Mohamed Hadi Habaebi, Elfatih A. A. Elsheikh, Md Rafiqul Islam, Fakher Eldin Mohamed Suliman, and Sinil Mubarak. "Enhanced CNN-LSTM Deep Learning for SCADA IDS Featuring Hurst Parameter Self-Similarity." IEEE Access 12 (2024): 6100–6116. http://dx.doi.org/10.1109/access.2024.3350978.
Full textRohith Vallabhaneni, Srinivas A Vaddadi, Sravanthi Dontu, Abhilash Maroju,. "A New Privacy Preservation Intrusion Detection (PPID) Techniques for Multiclass Attacks to Measure Its Reliability for Detecting Suspicious Activities." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (2023): 865–70. http://dx.doi.org/10.17762/ijritcc.v11i9s.9496.
Full textKhan, Izhar Ahmed, Dechang Pi, Zaheer Ullah Khan, Yasir Hussain, and Asif Nawaz. "HML-IDS: A Hybrid-Multilevel Anomaly Prediction Approach for Intrusion Detection in SCADA Systems." IEEE Access 7 (2019): 89507–21. http://dx.doi.org/10.1109/access.2019.2925838.
Full textYin, Xiao Chun, Zeng Guang Liu, Lewis Nkenyereye, and Bruce Ndibanje. "Toward an Applied Cyber Security Solution in IoT-Based Smart Grids: An Intrusion Detection System Approach." Sensors 19, no. 22 (2019): 4952. http://dx.doi.org/10.3390/s19224952.
Full textPasupuleti, Murali Krishna. "Smart Load Balancing and Real-Time Threat Prediction for National Energy Infrastructure." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 243–50. https://doi.org/10.62311/nesx/rp1925.
Full textOrman, Abdullah. "Cyberattack Detection Systems in Industrial Internet of Things (IIoT) Networks in Big Data Environments." Applied Sciences 15, no. 6 (2025): 3121. https://doi.org/10.3390/app15063121.
Full textBalani, Zina, and Mohammed Nasseh Mohammed. "Enhancing Cybersecurity against Stuxnet in the Future of Cyberwarfare: A Combined Approach Using Firewalls and Intrusion Detection Systems." International Journal of Science and Business 28, no. 1 (2023): 21–30. http://dx.doi.org/10.58970/ijsb.2202.
Full textAlsaiari, Abdulhakim, and Mohammad Ilyas. "Deep Learning for Smart Grid Intrusion Detection: A Hybrid CNN-LSTM-Based Model." International Journal of Artificial Intelligence & Applications 15, no. 3 (2024): 01–16. http://dx.doi.org/10.5121/ijaia.2024.15301.
Full textPasupuleti, Murali Krishna. "ecuring Critical Infrastructure with World Models that Learn from Real-World Sensor and Activity Logs." International Journal of Academic and Industrial Research Innovations(IJAIRI) 05, no. 04 (2025): 234–42. https://doi.org/10.62311/nesx/rp1825.
Full textM. R., Amal, and Venkadesh P. "Hybrid H-DOC: A bait for analyzing cyber attacker behavior." International journal of electrical and computer engineering systems 14, no. 1 (2023): 37–44. http://dx.doi.org/10.32985/ijeces.14.1.5.
Full textMesbah, Mohamed, Mahmoud Said Elsayed, Anca Delia Jurcut, and Marianne Azer. "Analysis of ICS and SCADA Systems Attacks Using Honeypots." Future Internet 15, no. 7 (2023): 241. http://dx.doi.org/10.3390/fi15070241.
Full textPretorius, Barend, and Brett van Niekerk. "Cyber-Security for ICS/SCADA." International Journal of Cyber Warfare and Terrorism 6, no. 3 (2016): 1–16. http://dx.doi.org/10.4018/ijcwt.2016070101.
Full textFidelis, Chukwujekwu Obodoeze, Nkemdilim Obiokafor Ifeyinwa, and Chijindu Asogwa Tochukwu. "SCADA for National Critical Infrastructures Review of the Security Threats, Vulnerabilities and Countermeasures." International Journal of Trend in Scientific Research and Development 2, no. 2 (2018): 974–82. https://doi.org/10.31142/ijtsrd9556.
Full textZhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "APT Attack Analysis in SCADA Systems." MATEC Web of Conferences 173 (2018): 01010. http://dx.doi.org/10.1051/matecconf/201817301010.
Full textCoffey, Kyle, Richard Smith, Leandros Maglaras, and Helge Janicke. "Vulnerability Analysis of Network Scanning on SCADA Systems." Security and Communication Networks 2018 (March 13, 2018): 1–21. http://dx.doi.org/10.1155/2018/3794603.
Full textAlimi, Oyeniyi Akeem, Khmaies Ouahada, Adnan M. Abu-Mahfouz, Suvendi Rimer, and Kuburat Oyeranti Adefemi Alimi. "A Review of Research Works on Supervised Learning Algorithms for SCADA Intrusion Detection and Classification." Sustainability 13, no. 17 (2021): 9597. http://dx.doi.org/10.3390/su13179597.
Full textL, Rajesh, and Penke Satyanarayana. "Detection and Blocking of Replay, False Command, and False Access Injection Commands in SCADA Systems with Modbus Protocol." Security and Communication Networks 2021 (September 27, 2021): 1–15. http://dx.doi.org/10.1155/2021/8887666.
Full textAra, Anees. "Security in Supervisory Control and Data Acquisition (SCADA) based Industrial Control Systems: Challenges and Solutions." IOP Conference Series: Earth and Environmental Science 1026, no. 1 (2022): 012030. http://dx.doi.org/10.1088/1755-1315/1026/1/012030.
Full textPatil, Ashish Babasaheb. "Supervisory Control and Data Acquisition for Motor Operation using Arduino." International Journal for Research in Applied Science and Engineering Technology 10, no. 4 (2022): 2602–5. http://dx.doi.org/10.22214/ijraset.2022.41845.
Full textJohnson, Chris, Rob Harkness, and Maria Evangelopoulou. "Forensic Attacks Analysis and the Cyber Security of Safety-Critical Industrial Control Systems." Journal of System Safety 53, no. 1 (2017): 29–34. http://dx.doi.org/10.56094/jss.v53i1.102.
Full textMir, Abdul Wahid, and Ramkumar Ketti Ramachandran. "Security gaps assessment of smart grid based SCADA systems." Information & Computer Security 27, no. 3 (2019): 434–52. http://dx.doi.org/10.1108/ics-12-2018-0146.
Full textChen, Qian, Robert K. Abercrombie, and Frederick T. Sheldon. "Risk Assessment For Industrial Control Systems Quantifying Availability Using Mean Failure Cost (MFC)." Journal of Artificial Intelligence and Soft Computing Research 5, no. 3 (2015): 205–20. http://dx.doi.org/10.1515/jaiscr-2015-0029.
Full textJakabóczki, Gábor, Péter Tamás Szemes, and Éva Ádámkó. "A MODBUS RTU protokoll biztonságtechnikai vizsgálata, új kriptográfiai megoldások tesztelése." International Journal of Engineering and Management Sciences 1, no. 2 (2016): 35–42. http://dx.doi.org/10.21791/ijems.2016.2.5.
Full textCamargo, Otávio Augusto Maciel, Julio Cesar Duarte, Anderson Fernandes Pereira Dos Santos, and Cesar Augusto Borges. "A Review of Testbeds on SCADA Systems with Malware Analysis." Revista de Informática Teórica e Aplicada 29, no. 2 (2022): 84–94. http://dx.doi.org/10.22456/2175-2745.112813.
Full textNivethan, J., and M. Papa. "On the use of open-source firewalls in ICS/SCADA systems." Information Security Journal: A Global Perspective 25, no. 1-3 (2016): 83–93. http://dx.doi.org/10.1080/19393555.2016.1172283.
Full textQassim, Qais Saif, Norziana Jamil, Maslina Daud, Ahmed Patel, and Norhamadi Ja’affar. "A review of security assessment methodologies in industrial control systems." Information & Computer Security 27, no. 1 (2019): 47–61. http://dx.doi.org/10.1108/ics-04-2018-0048.
Full textGazzan, Mazen, and Frederick T. Sheldon. "Opportunities for Early Detection and Prediction of Ransomware Attacks against Industrial Control Systems." Future Internet 15, no. 4 (2023): 144. http://dx.doi.org/10.3390/fi15040144.
Full textBajwa, Ammar, Aleem Al Razee Tonoy, Sohel Rana, and Ishtiaque Ahmed. "CYBERSECURITY IN INDUSTRIAL CONTROL SYSTEMS: A SYSTEMATIC LITERATURE REVIEW ON AI-BASED THREAT DETECTION FOR SCADA AND IOT NETWORKS." ASRC Procedia: Global Perspectives in Science and Scholarship 01, no. 01 (2025): 01–15. https://doi.org/10.63125/1cr1kj17.
Full textHan, Xiaopeng, Yukun Niu, Zhigang Cao, Ding Zhou, and Bo Liu. "RHAD: A Reinforced Heterogeneous Anomaly Detector for Robust Industrial Control System Security." Electronics 14, no. 12 (2025): 2440. https://doi.org/10.3390/electronics14122440.
Full textMAYUB, AFRIZAL, IVAN SYAHRONI, FAHMIZAL FAHMIZAL, and MUHAMMAD ARROFIQ. "Kinematika dan Antarmuka Robot SCARA Serpent." ELKOMIKA: Jurnal Teknik Energi Elektrik, Teknik Telekomunikasi, & Teknik Elektronika 8, no. 3 (2020): 561. http://dx.doi.org/10.26760/elkomika.v8i3.561.
Full textИванов, С. О., Т. Н. Копышева та М. В. Никандров. "Программно-аппаратный стенд для оценки кибернетической защиты автоматизированной системы управления технологическим процессом". Vestnik of Volga State University of Technology. Series Radio Engineering and Infocommunication Systems, № 3(55) (27 грудня 2022): 37–46. https://doi.org/10.25686/2306-2819.2022.3.37.
Full textEmake, Erhovwosere Donald, Ibrahim Adepoju Adeyanju, and Godwin Obruozie Uzedhe. "Industrial Control Systems (ICS): Cyber-attacks & Security Optimization." International Journal of Computer Engineering and Information Technology 12, no. 5 (2020): 31–41. http://dx.doi.org/10.47277/ijceit/12(5)1.
Full textRusanov, V. V., V. I. Perov, and M. A. Samoilov. "Automation of public catering enterprises using modern digital technologies: Arduino IDE, OPC Modbus and Master Scada programs." Proceedings of the Voronezh State University of Engineering Technologies 80, no. 2 (2018): 38–44. http://dx.doi.org/10.20914/2310-1202-2018-2-38-44.
Full textYudianto, Yudianto, and Amrifan Saladin Mohruni. "INDUSTRIAL CONTROL SYSTEM APPLIED AND PROBLEMS: A REVIEW AND EXPERIENCES." Journal of Mechanical Science and Engineering 8, no. 1 (2021): 001–5. http://dx.doi.org/10.36706/jmse.v8i1.49.
Full textAmangeldy, Bibars, Nurdaulet Tasmurzayev, Yedil Nurakhov, Shona Shinassylov, and Samson Dawit Bekele. "Development and Evaluation of an Intelligent Control System for Sustainable and Efficient Energy Management." WSEAS TRANSACTIONS ON ELECTRONICS 14 (December 31, 2023): 135–43. http://dx.doi.org/10.37394/232017.2023.14.16.
Full textJunwon Kim, Junwon Kim, Jiho Shin Junwon Kim, and Jung Taek Seo Jiho Shin. "Detection and Blocking Method against DLL Injection Attack Using PEB-LDR of ICS EWS in Smart IoT Environments." 網際網路技術學刊 23, no. 4 (2022): 875–88. http://dx.doi.org/10.53106/160792642022072304022.
Full textOdumu, Wesley O., Barnabas I. Gwaivangmin, and Ademola P. Adewoye. "Safeguarding National Critical Energy Infrastructure using Cybersecurity Frameworks and Collaborative Approach for a Resilient Energy Future." NEWPORT INTERNATIONAL JOURNAL OF SCIENTIFIC AND EXPERIMENTAL SCIENCES 6, no. 1 (2025): 31–47. https://doi.org/10.59298/nijses/2025/61.3147.
Full textRichter, Maximilian, Klaus Schwarz, and Reiner Creutzburg. "Conception and Implementation of Professional Laboratory Exercises in the field of ICS/SCADA Security - Part I: Fundamentals." Electronic Imaging 2021, no. 3 (2021): 73–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.3.mobmu-073.
Full textSuroso, Suroso, Sahnyoto Supriyadi, Totok Dermawan, and Adi Abimanyu. "Desain Sistem Mekanik Robot SCARA untuk Internet Nuclear Instrumentation Laboratory." Jurnal Pengawasan Tenaga Nuklir 3, no. 2 (2023): 7–13. http://dx.doi.org/10.53862/jupeten.v3i2.002.
Full textNankya, Mary, Robin Chataut, and Robert Akl. "Securing Industrial Control Systems: Components, Cyber Threats, and Machine Learning-Driven Defense Strategies." Sensors 23, no. 21 (2023): 8840. http://dx.doi.org/10.3390/s23218840.
Full text