Academic literature on the topic 'IEC 60870-5-104'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IEC 60870-5-104.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IEC 60870-5-104"
Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.
Full textHareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.
Full textHan, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.
Full textMaulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.
Full textCsatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.
Full textQassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.
Full textQassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.
Full textDurak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.
Full textFeria Briceño, John Henry. "Diseño e implementación de un algoritmo para translación de protocolo entre las normas IEC60870-5-104 y MODBUS TCP/IP." Ingenium Revista de la facultad de ingeniería 16, no. 32 (2015): 102. http://dx.doi.org/10.21500/01247492.1674.
Full textArifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textDissertations / Theses on the topic "IEC 60870-5-104"
Pekárek, Dominik. "Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-319300.
Full textKrejčír, Ľuboš. "Inteligentní systémy hromadného sběru dat v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219336.
Full textAndersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Full textFundin, August. "Generating Datasets Through the Introduction of an Attack Agent in a SCADA Testbed : A methodology of creating datasets for intrusion detection research in a SCADA system using IEC-60870-5-104." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-175911.
Full textSobotka, Lukáš. "Analýza protokolů pro komunikaci v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399184.
Full textBeneš, Pavel. "Simulace komunikační části moderních průmyslových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413041.
Full textHošták, Viliam Samuel. "Učení se automatů pro rychlou detekci anomálií v síťovém provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449296.
Full textJančová, Markéta. "Generická analýza toků v počítačových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417290.
Full textCHIU, YEN-MING, and 邱彥銘. "Implementation and Design of IEC 60870-5-104 and ARPv4 Fuzz Testing." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/92ukj4.
Full textYeh, Yu-Kuan, and 葉禹寬. "Intrusion Detection Method for IEC 60870-5-104 Protocol Using Honeypot Logs." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394024%22.&searchmode=basic.
Full textBook chapters on the topic "IEC 60870-5-104"
Holik, Filip, Doney Abraham, and Sule Yildirim Yayilgan. "Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10525-8_19.
Full textNguyen, Duc Duong, Manh Hung Do, Ngoc Thanh Pham, Van Dung Ngo, and Viet Phuong Pham. "Design Smart Factory Using RTDS and 800xA SCADA Based on IEC 60870-5-104." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90606-0_30.
Full textConference papers on the topic "IEC 60870-5-104"
He, Bangwei, Feng Wang, Jianxiu Li, et al. "Cyber Risk Detection for IEC 60870-5-104 Operation Commands in Distribution Systems." In 2025 2nd International Conference on Smart Grid and Artificial Intelligence (SGAI). IEEE, 2025. https://doi.org/10.1109/sgai64825.2025.11009438.
Full textRadoglou-Grammatikis, Panagiotis, Panagiotis Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, and Emmanouil Panaousis. "Attacking IEC-60870-5-104 SCADA Systems." In 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. http://dx.doi.org/10.1109/services.2019.00022.
Full textIlgner, Petr, and Radek Fujdiak. "Fuzzing Framework for IEC 60870-5-104 Protocol." In CSSE 2022: 2022 5th International Conference on Computer Science and Software Engineering. ACM, 2022. http://dx.doi.org/10.1145/3569966.3570026.
Full textGrammatikis, Panagiotis Radoglou, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Dimitrios Margounakis, Apostolos Tsiakalos, and Georgios Efstathopoulos. "An Anomaly Detection Mechanism for IEC 60870-5-104." In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST). IEEE, 2020. http://dx.doi.org/10.1109/mocast49295.2020.9200285.
Full textHodo, Ersi, Stepan Grebeniuk, Henri Ruotsalainen, and Paul Tavolato. "Anomaly Detection for Simulated IEC-60870-5-104 Trafiic." In ARES '17: International Conference on Availability, Reliability and Security. ACM, 2017. http://dx.doi.org/10.1145/3098954.3103166.
Full textBaiocco, Alessio, and Stephen D. Wolthusen. "Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard." In 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2018. http://dx.doi.org/10.1109/isgteurope.2018.8571604.
Full textLin, Chih-Yuan, and Simin Nadjm-Tehrani. "Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3198458.3198460.
Full textYang, Y., K. McLaughlin, S. Sezer, Y. B. Yuan, and W. Huang. "Stateful intrusion detection for IEC 60870-5-104 SCADA security." In 2014 IEEE Power & Energy Society General Meeting. IEEE, 2014. http://dx.doi.org/10.1109/pesgm.2014.6939218.
Full textGrigoriou, Elisavet, Athanasios Liatifis, Panagiotis Radoglou Grammatikis, et al. "Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850329.
Full textCindrić, Ivan, and Tamara Hadjina. "An Analysis of IEC 62351 Implementations for Securing IEC 60870-5-104 Communication." In 2023 IEEE Belgrade PowerTech. IEEE, 2023. http://dx.doi.org/10.1109/powertech55446.2023.10202923.
Full text