Academic literature on the topic 'IEC 60870-5-104'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IEC 60870-5-104.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "IEC 60870-5-104"

1

Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.

Full text
Abstract:
IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and information data injection. From the SCADA testbed that we setup, we showed that a success-ful control command injection attack can be implemented by exploiting the vulnerabilities identified earlier.
APA, Harvard, Vancouver, ISO, and other styles
2

Hareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Han, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Maulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.

Full text
Abstract:
Abstract
 The success of SCADA and Defense Scheme system will take effect the operation of electric power system. However the two systems were stand alone in Java-Bali power system due to different development time and platform. At present in Java-Bali a modern Defense Scheme system is being built, that is called Adaptive Defense Scheme (ADS). ADS system has capability to communicate data between IEDs or relay, and between IEDs with ADS server. ADS server has also communication protocol such as IEC 60870-5-104. In a previous study it was found that the integration between two different systems was very possible, namely between PMU and SCADA. This paper will describe design of integration between ADS system with SCADA master station via communication routers that are commonly used to communicate with Remote Terminal Unit (RTU) based on IEC 60870-5-104. This integration will have financial and non financial effects on power system operation utility. Through this integration, data integrity will be obtained because of single data source, and investment and operation costs will be optimized because utility can avoid duplication of equipment functions. The integration of ADS system and SCADA will not affect the success rate of ADS because it is in different authority area.
 
 ABSTRAK 
 Keberhasilan sistem SCADA dan Defense Scheme akan berpengaruh terhadap pengaturan operasi sistem tenaga listrik. Namun kedua sistem ini di sistem tenaga listrik Jawa-Bali berdiri sendiri dikarenakan waktu pembangunan dan platform yang berbeda. Saat ini di Jawa-Bali sedang dibangun sistem Defense Scheme yang modern, yang disebut dengan Adaptive Defense Scheme (ADS). Sistem ADS memiliki kemampuan komunikasi data antar IED atau rele, dan antara IED dengan server ADS. Server ADS juga memiliki protokol komunikasi SCADA seperti IEC 60870-5-104. Dalam penelitian terdahulu diketahui bahwa integrasi antara dua sistem yang berbeda sangat dimungkinkan yaitu antara PMU dengan SCADA. Pada paper ini disampaikan rancangan integrasi antara sistem ADS dengan master station SCADA melalui router komunikasi yang biasa digunakan untuk berkomunikasi dengan Remote Terminal Unit (RTU) berbasis IEC 60870-5-104. Adanya integrasi ini akan memberikan dampak finansial dan non finansial terhadap pengelola operasi sistem tenaga listrik. Melalui integrasi ini maka akan diperoleh integritas data karena adanya satu sumber data, dan dapat dioptimalkannya biaya investasi dan biaya operasi karena utility dapat menghindari duplikasi fungsi peralatan. Integrasi sistem ADS dan SCADA tidak akan mempengaruhi tingkat keberhasilan ADS karena berada di area kewenangan yang berbeda.
APA, Harvard, Vancouver, ISO, and other styles
5

Csatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.

Full text
Abstract:
IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems. However, security was not a design goal when it was originally published: This protocol lacks built-in security features such as encryption, integrity protection, or authentication. In this paper, we describe novel types of attacks against the protocol in a holistic way. Therefore, we also enumerate the possible entry points of the threat actors and demonstrate a new technique, where the malicious actor can precisely target the attack. These methods are demonstrated both on simulated environment and actual devices and compared with already published methods.
APA, Harvard, Vancouver, ISO, and other styles
6

Qassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Qassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Durak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Feria Briceño, John Henry. "Diseño e implementación de un algoritmo para translación de protocolo entre las normas IEC60870-5-104 y MODBUS TCP/IP." Ingenium Revista de la facultad de ingeniería 16, no. 32 (2015): 102. http://dx.doi.org/10.21500/01247492.1674.

Full text
Abstract:
<p style="margin: 0cm 0cm 0pt; text-align: justify; line-height: 150%;"><span style="color: black; line-height: 150%; font-family: 'Arial','sans-serif'; font-size: 12pt; mso-bidi-font-weight: bold;">Este artículo muestra los resultados del proceso de diseño, implementación y prueba de un algoritmo para hacer la translación de protocolo entre las normas IEC 60870-5-104 y MODBUS TCP/IP, éste modelo de algoritmos son de amplio uso en los procesos de supervisión y automatización en sub-estaciones eléctricas.</span></p>
APA, Harvard, Vancouver, ISO, and other styles
10

Arifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Full text
Abstract:
Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) Protocol as many SCADA systems use these two protocols.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "IEC 60870-5-104"

1

Pekárek, Dominik. "Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-319300.

Full text
Abstract:
This thesis is focused on testing of communication protocols IEC 60870-5-103 and IEC 60870-5-104. Theoretical part of the thesis describes basic principles, services and possibilities of both communication protocols. Practical part of the thesis deals with configuration of the IEC 60870-5-103 communication standard of protective terminal REF630. PCVDEW6 tool was used to test this communication protocol. Next part of the thesis is focused on convertion of the communication standard IEC 61850 to IEC 61870-5-104 using control system COM600. The testing of both communication protocols was carried out in the laboratory of the protection relays on the testing panels at ABB Brno.
APA, Harvard, Vancouver, ISO, and other styles
2

Krejčír, Ľuboš. "Inteligentní systémy hromadného sběru dat v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219336.

Full text
Abstract:
This paper is describing the issues of data collection in power distribution networks. It discusses the posibilities of data communication over wide area networks using the communication protocol IEC 60870-5-104, used in power distribution systems for transmission of information over IP networks. Thesis presents 4 technologies, suitable for data collection, with respect to the use of existing infrastructure of the utility. It focuses on design of appropriate data types in correspondence with used IEC 60870-5-104 protocol, and estimates the minimum data requirements for transmission, through proposed hierarchical network, with collecting data concentrators. For verification of given design, simulations are carried out based on proposed data loads with subsequent analysis of network load and transmission delays. Consequently, the results are analyzed and selected parts of network optimized for improvement od selected results, of which causes of formation are discussed in debate.
APA, Harvard, Vancouver, ISO, and other styles
3

Andersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.

Full text
Abstract:
Industrial Control Systems (ICS) are an integral part of modernsociety, not least when it comes to controlling and protecting criticalinfrastructure such as power grids and water supply. There is a need to testthese systems for vulnerabilities, but it is often difficult if not impossible to doso in operational real time systems since they have been shown to be sensitiveeven to disturbances caused by benign diagnostic tools. This thesis exploreshow ICS field devices can be simulated in order to fool potential antagonists,and how they can be used in virtualized ICS for cyber security research. 8different field devices were simulated using the honeypot daemon Honeyd,and a generally applicable simulation methodology was developed. It was alsoexplored how these simulations can be further developed in order to functionlike real field devices in virtualized environments.<br>Industriella informations- och styrsystem utgör en viktig delav vårt moderna samhälle, inte minst när det gäller kontroll och skydd avkritisk infrastruktur som elnät och vattenförsörjning. Det finns stora behov avatt säkerhetstesta dessa typer av system, vilket ofta är omöjligt iproduktionsmiljöer med realtidskrav som är erkänt känsliga för störningar, tilloch med från vanligt förekommande analysverktyg. Denna rapport presenterarhur vanliga komponenter i industriella informations- och styrsystem kansimuleras för att lura potentiella antagonister, och hur de kan användas ivirtualiserade styrsystem för cybersäkerhetsforskning. 8 olika komponentersimulerades med hjälp av Honeyd, och en generellt applicerbarsimuleringsmetodik utvecklades. Hur dessa simuleringar kan vidareutvecklasför att fungera som riktiga styrsystemskomponenter i virtualiserade miljöer harockså undersökts.
APA, Harvard, Vancouver, ISO, and other styles
4

Fundin, August. "Generating Datasets Through the Introduction of an Attack Agent in a SCADA Testbed : A methodology of creating datasets for intrusion detection research in a SCADA system using IEC-60870-5-104." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-175911.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sobotka, Lukáš. "Analýza protokolů pro komunikaci v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399184.

Full text
Abstract:
This work deals security of SCADA industry systems which are used in energetic networks. It describes architecture of those systems and also analyze in details two communication protocols -- DNP3 and IEC 60870-5-104.  Next part is devoted to the analysis of anomaly and security threats which can be happen in SCADA systems. The main goal of this work is design and implementation of system which will be able to detect some of threats or anomalies. Also is necessary to propose simulation environment for testing.
APA, Harvard, Vancouver, ISO, and other styles
6

Beneš, Pavel. "Simulace komunikační části moderních průmyslových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413041.

Full text
Abstract:
The thesis is focused on simulating of protocols from standard IEC 61850 in simulation tool OMNeT++. The theoretical part in the thesis deals with description of the field of operating technologies, supervisory control and data acquisition and protocols Tase-2/ICCP, IEC 61850, IEC 60870-5-104, DNP 3 and DLMS/COSEM. Next part deals with parameters influencing connection and description of simulation tools NS2/NS3, OPNET and OMNeT++. In the practical part there is created a network containing protocols from the standard IEC 61850 in the simulation program OMNeT++. Then in the network a end to end delay and packet loss with increasing traffic is measured.
APA, Harvard, Vancouver, ISO, and other styles
7

Hošták, Viliam Samuel. "Učení se automatů pro rychlou detekci anomálií v síťovém provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449296.

Full text
Abstract:
The focus of this thesis is the fast network anomaly detection based on automata learning. It describes and compares several chosen automata learning algorithms including their adaptation for the learning of network characteristics. In this work, various network anomaly detection methods based on learned automata are proposed which can detect sequential as well as statistical anomalies in target communication. For this purpose, they utilize automata's mechanisms, their transformations, and statistical analysis. Proposed detection methods were implemented and evaluated using network traffic of the protocol IEC 60870-5-104 which is commonly used in industrial control systems.
APA, Harvard, Vancouver, ISO, and other styles
8

Jančová, Markéta. "Generická analýza toků v počítačových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417290.

Full text
Abstract:
Tato práce se zabývá problematikou popisu síťového provozu pomocí automaticky vytvořeného modelu komunikace. Hlavním zaměřením jsou komunikace v řídicích systémech , které využívají speciální protokoly, jako je například IEC 60870-5-104 . V této práci představujeme metodu charakteristiky síťového provozu z pohledu obsahu komunikace i chování v čase. Tato metoda k popisu využívá deterministické konečné automaty , prefixové stromy  a analýzu opakovatelnosti. Ve druhé části této diplomové práce se zaměřujeme na implementaci programu, který je schopný na základě takového modelu komunikace verifikovat síťový provoz v reálném čase.
APA, Harvard, Vancouver, ISO, and other styles
9

CHIU, YEN-MING, and 邱彥銘. "Implementation and Design of IEC 60870-5-104 and ARPv4 Fuzz Testing." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/92ukj4.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊工程學系碩士班<br>106<br>This research and implementation are aim to use Fuzz testing method to unveil the potential known/unknown flaws(especially the 0-day vulnerabilities) in the industrial control system which is running IEC 60870-5-104 (IEC-104) and the network communication system using ARPv4. IEC-104 provides a communication profile over TCP/IP for sending telecontrol messages between a central station and individual outstations. Furthermore, the ARPv4 protocol is used to acquire the receiver’s MAC address by using its IP address. The fuzz testing program is based on Linux, an open source operating system, and uses the Python to automatically sending our test data to the target server. Besides, Wireshark is used to monitor if the target server has any abnormal condition or even crashed. The experimental result shows both the IEC-104 and ARPv4 can totally recognize the malformed packets and drop them if we use the basic test data. However, the basic test data cannot guarantee the safety of these protocols. It needs professional engineering to gather and evaluate more test data for fuzz testing.
APA, Harvard, Vancouver, ISO, and other styles
10

Yeh, Yu-Kuan, and 葉禹寬. "Intrusion Detection Method for IEC 60870-5-104 Protocol Using Honeypot Logs." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394024%22.&searchmode=basic.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>107<br>Industrial Control system (ICS) and Supervisory Control and Data Acquisition (SCADA) system usually do not include security design in their design phase. With the growing demands of automation and remote monitoring, ICSs become more complex and have greater internet connectivity. As a result, the risk of hacking on industrial control networks also increases. Therefore, designing an effective intrusion detection system (IDS) for ICS has become an important issue. In this thesis, we design a honeypot to capture malicious packets of IEC 60870-5-104 protocol and then use deep packet analysis and machine learning algorithm to analyze the honeypot log. In the honeypot design, we add new codes to the open-source honeypot Conpot for supporting IEC 60870-5-104 protocol. The X-means clustering algorithm and Smith-Waterman Algorithm are used for generating and comparing attack gene sequences, respectively. If an attack sequence is unseen, then it is added to the attack signature database with appropriate class label. If an attack sequence is known in the attack signature database, then the proposed system will provide the characteristics of the attack, which in turn can be used as rules in intrusion detection system. The experimental results show that the performance of the proposed method has about 90.9% for accuracy, 96% for precision, 91% for recall, and 92% for F1-score.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "IEC 60870-5-104"

1

Holik, Filip, Doney Abraham, and Sule Yildirim Yayilgan. "Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10525-8_19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nguyen, Duc Duong, Manh Hung Do, Ngoc Thanh Pham, Van Dung Ngo, and Viet Phuong Pham. "Design Smart Factory Using RTDS and 800xA SCADA Based on IEC 60870-5-104." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90606-0_30.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "IEC 60870-5-104"

1

He, Bangwei, Feng Wang, Jianxiu Li, et al. "Cyber Risk Detection for IEC 60870-5-104 Operation Commands in Distribution Systems." In 2025 2nd International Conference on Smart Grid and Artificial Intelligence (SGAI). IEEE, 2025. https://doi.org/10.1109/sgai64825.2025.11009438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Radoglou-Grammatikis, Panagiotis, Panagiotis Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, and Emmanouil Panaousis. "Attacking IEC-60870-5-104 SCADA Systems." In 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. http://dx.doi.org/10.1109/services.2019.00022.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ilgner, Petr, and Radek Fujdiak. "Fuzzing Framework for IEC 60870-5-104 Protocol." In CSSE 2022: 2022 5th International Conference on Computer Science and Software Engineering. ACM, 2022. http://dx.doi.org/10.1145/3569966.3570026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grammatikis, Panagiotis Radoglou, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Dimitrios Margounakis, Apostolos Tsiakalos, and Georgios Efstathopoulos. "An Anomaly Detection Mechanism for IEC 60870-5-104." In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST). IEEE, 2020. http://dx.doi.org/10.1109/mocast49295.2020.9200285.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Hodo, Ersi, Stepan Grebeniuk, Henri Ruotsalainen, and Paul Tavolato. "Anomaly Detection for Simulated IEC-60870-5-104 Trafiic." In ARES '17: International Conference on Availability, Reliability and Security. ACM, 2017. http://dx.doi.org/10.1145/3098954.3103166.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Baiocco, Alessio, and Stephen D. Wolthusen. "Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard." In 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2018. http://dx.doi.org/10.1109/isgteurope.2018.8571604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lin, Chih-Yuan, and Simin Nadjm-Tehrani. "Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3198458.3198460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yang, Y., K. McLaughlin, S. Sezer, Y. B. Yuan, and W. Huang. "Stateful intrusion detection for IEC 60870-5-104 SCADA security." In 2014 IEEE Power & Energy Society General Meeting. IEEE, 2014. http://dx.doi.org/10.1109/pesgm.2014.6939218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Grigoriou, Elisavet, Athanasios Liatifis, Panagiotis Radoglou Grammatikis, et al. "Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850329.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cindrić, Ivan, and Tamara Hadjina. "An Analysis of IEC 62351 Implementations for Securing IEC 60870-5-104 Communication." In 2023 IEEE Belgrade PowerTech. IEEE, 2023. http://dx.doi.org/10.1109/powertech55446.2023.10202923.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!