Academic literature on the topic 'IEC 60870-5-104 (IEC 104)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'IEC 60870-5-104 (IEC 104).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "IEC 60870-5-104 (IEC 104)"
Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.
Full textHan, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.
Full textHareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.
Full textMaulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.
Full textArifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textCsatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.
Full textDurak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.
Full textQassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.
Full textQassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.
Full textNadeem, Furquan, Mohd Asim Aftab, S. M. Suhail Hussain, et al. "Virtual Power Plant Management in Smart Grids with XMPP Based IEC 61850 Communication." Energies 12, no. 12 (2019): 2398. http://dx.doi.org/10.3390/en12122398.
Full textDissertations / Theses on the topic "IEC 60870-5-104 (IEC 104)"
Pekárek, Dominik. "Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-319300.
Full textKrejčír, Ľuboš. "Inteligentní systémy hromadného sběru dat v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219336.
Full textRigi, Aref, and Bahnam Jura. "Analys av standarden IEC 61850 för styrning av elkraftsystem." Thesis, KTH, Hälsoinformatik och logistik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-253006.
Full textFundin, August. "Generating Datasets Through the Introduction of an Attack Agent in a SCADA Testbed : A methodology of creating datasets for intrusion detection research in a SCADA system using IEC-60870-5-104." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-175911.
Full textAndersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Full textSobotka, Lukáš. "Analýza protokolů pro komunikaci v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399184.
Full textBeneš, Pavel. "Simulace komunikační části moderních průmyslových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413041.
Full textHošták, Viliam Samuel. "Učení se automatů pro rychlou detekci anomálií v síťovém provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449296.
Full textJančová, Markéta. "Generická analýza toků v počítačových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417290.
Full textHorych, Vladimír. "Analýza řídících protokolů využívaných v průmyslových aplikacích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218084.
Full textBook chapters on the topic "IEC 60870-5-104 (IEC 104)"
Holik, Filip, Doney Abraham, and Sule Yildirim Yayilgan. "Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10525-8_19.
Full textNguyen, Duc Duong, Manh Hung Do, Ngoc Thanh Pham, Van Dung Ngo, and Viet Phuong Pham. "Design Smart Factory Using RTDS and 800xA SCADA Based on IEC 60870-5-104." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90606-0_30.
Full textFrappart, Frédéric, Guillaume Ramillien, and Lucía Seoane. "Monitoring Water Mass Redistributions on Land and Polar Ice Sheets Using the GRACE Gravimetry from Space Mission." In Land Surface Remote Sensing in Continental Hydrology. Elsevier, 2016. http://dx.doi.org/10.1016/b978-1-78548-104-8.50008-5.
Full textConference papers on the topic "IEC 60870-5-104 (IEC 104)"
He, Bangwei, Feng Wang, Jianxiu Li, et al. "Cyber Risk Detection for IEC 60870-5-104 Operation Commands in Distribution Systems." In 2025 2nd International Conference on Smart Grid and Artificial Intelligence (SGAI). IEEE, 2025. https://doi.org/10.1109/sgai64825.2025.11009438.
Full textRadoglou-Grammatikis, Panagiotis, Panagiotis Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, and Emmanouil Panaousis. "Attacking IEC-60870-5-104 SCADA Systems." In 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. http://dx.doi.org/10.1109/services.2019.00022.
Full textIlgner, Petr, and Radek Fujdiak. "Fuzzing Framework for IEC 60870-5-104 Protocol." In CSSE 2022: 2022 5th International Conference on Computer Science and Software Engineering. ACM, 2022. http://dx.doi.org/10.1145/3569966.3570026.
Full textGrammatikis, Panagiotis Radoglou, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Dimitrios Margounakis, Apostolos Tsiakalos, and Georgios Efstathopoulos. "An Anomaly Detection Mechanism for IEC 60870-5-104." In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST). IEEE, 2020. http://dx.doi.org/10.1109/mocast49295.2020.9200285.
Full textHodo, Ersi, Stepan Grebeniuk, Henri Ruotsalainen, and Paul Tavolato. "Anomaly Detection for Simulated IEC-60870-5-104 Trafiic." In ARES '17: International Conference on Availability, Reliability and Security. ACM, 2017. http://dx.doi.org/10.1145/3098954.3103166.
Full textCindrić, Ivan, and Tamara Hadjina. "An Analysis of IEC 62351 Implementations for Securing IEC 60870-5-104 Communication." In 2023 IEEE Belgrade PowerTech. IEEE, 2023. http://dx.doi.org/10.1109/powertech55446.2023.10202923.
Full textBaiocco, Alessio, and Stephen D. Wolthusen. "Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard." In 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2018. http://dx.doi.org/10.1109/isgteurope.2018.8571604.
Full textLin, Chih-Yuan, and Simin Nadjm-Tehrani. "Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3198458.3198460.
Full textYang, Y., K. McLaughlin, S. Sezer, Y. B. Yuan, and W. Huang. "Stateful intrusion detection for IEC 60870-5-104 SCADA security." In 2014 IEEE Power & Energy Society General Meeting. IEEE, 2014. http://dx.doi.org/10.1109/pesgm.2014.6939218.
Full textGrigoriou, Elisavet, Athanasios Liatifis, Panagiotis Radoglou Grammatikis, et al. "Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850329.
Full text