Journal articles on the topic 'IEC 60870-5-104'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 29 journal articles for your research on the topic 'IEC 60870-5-104.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.
Full textHareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.
Full textHan, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.
Full textMaulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.
Full textCsatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.
Full textQassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.
Full textQassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.
Full textDurak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.
Full textFeria Briceño, John Henry. "Diseño e implementación de un algoritmo para translación de protocolo entre las normas IEC60870-5-104 y MODBUS TCP/IP." Ingenium Revista de la facultad de ingeniería 16, no. 32 (2015): 102. http://dx.doi.org/10.21500/01247492.1674.
Full textArifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textShi, Shan, Yong Wang, Cunming Zou, and Yingjie Tian. "AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol." Journal of Computer and Communications 10, no. 01 (2022): 27–41. http://dx.doi.org/10.4236/jcc.2022.101002.
Full textNadeem, Furquan, Mohd Asim Aftab, S. M. Suhail Hussain, et al. "Virtual Power Plant Management in Smart Grids with XMPP Based IEC 61850 Communication." Energies 12, no. 12 (2019): 2398. http://dx.doi.org/10.3390/en12122398.
Full textTao, Weiqing, Mengyu Ma, Ming Ding, Wei Xie, and Chen Fang. "A Priority-Based Synchronous Phasor Transmission Protocol Extension Method for the Active Distribution Network." Applied Sciences 9, no. 10 (2019): 2135. http://dx.doi.org/10.3390/app9102135.
Full textJarmakiewicz, Jacek, Krzysztof Maślank, and Krzysztof Parobczak. "Evaluation of the Cyber Security Provision System for Critical Infrastructure." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 22–29. http://dx.doi.org/10.26636/jtit.2015.4.980.
Full textSyamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textShih, Yusi. "Measured wind data in digital: Develop and optimize offshore wind farm SCADA by IEC 60870-5-104 protocol and DMZ." Energy Reports 8 (April 2022): 1231–42. http://dx.doi.org/10.1016/j.egyr.2021.11.182.
Full textAkbarzadeh, Aida, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt, and Hans Kristian Muggerud. "Attacking IEC 61850 Substations by Targeting the PTP Protocol." Electronics 12, no. 12 (2023): 2596. http://dx.doi.org/10.3390/electronics12122596.
Full textYang, Chao, Deji Chen, and Hongyuan Hu. "IEC104 protocol-based substation data upload IoT cloud platform implementation." Journal of Physics: Conference Series 2874, no. 1 (2024): 012006. http://dx.doi.org/10.1088/1742-6596/2874/1/012006.
Full textHarrou, Fouzi, Benamar Bouyeddou, Abdelkader Dairi, and Ying Sun. "Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids." Future Internet 16, no. 6 (2024): 184. http://dx.doi.org/10.3390/fi16060184.
Full textVrdoljak, K., B. Kopić, M. Gec, J. Krstulović Opara, and S. Sekulić. "Automatic Generation Control Application for Transmission and Generation Centres." Journal of Energy - Energija 67, no. 2 (2022): 23–32. http://dx.doi.org/10.37798/201867277.
Full textTao, Weiqing, Xiong Chen, and Qiaoyun Zhang. "Realization of IEC 60870-5-104 Protocol in DTU." International Journal of Computer and Electrical Engineering, 2010, 815–20. http://dx.doi.org/10.7763/ijcee.2010.v2.233.
Full textEgger, Michael, Günther Eibl, and Dominik Engel. "Comparison of approaches for intrusion detection in substations using the IEC 60870-5-104 protocol." Energy Informatics 3, S1 (2020). http://dx.doi.org/10.1186/s42162-020-00118-4.
Full textBaltuille Puente, Pablo, Antonio Morán, Serafin Alonso, Miguel Ángel Prada, Juan José Fuertes, and Manuel Domínguez. "Demostrador para el análisis de tráfico de red en subestaciones de tracción basadas en IEC61850." Jornadas de Automática, no. 45 (July 19, 2024). http://dx.doi.org/10.17979/ja-cea.2024.45.10920.
Full textArifin, M. Agus Syamsul, Deris Stiawan, Bhakti Yudho Suprapto, et al. "Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104." IET Cyber-Physical Systems: Theory & Applications, January 4, 2024. http://dx.doi.org/10.1049/cps2.12085.
Full textTeryak, Hadir, Abdullatif Albaseer, Mohamed Abdallah, Saif Al-kuwari, and Marwa Qaraqe. "Double-Edged Defense: Thwarting Cyber Attacks and Adversarial Machine Learning in IEC 60870-5-104 Smart Grids." IEEE Open Journal of the Industrial Electronics Society, 2023, 1–14. http://dx.doi.org/10.1109/ojies.2023.3336234.
Full textAgus Syamsul Arifin, M., Deris Stiawan, Bhakti Yudho Suprapto, et al. "A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard." IEEE Access, 2024, 1. http://dx.doi.org/10.1109/access.2024.3473895.
Full textRadoglou-Grammatikis, Panagiotis, Konstantinos Rompolos, Panagiotis Sarigiannidis, et al. "Modelling, Detecting and Mitigating Threats Against Industrial Healthcare Systems: A combined SDN and Reinforcement Learning Approach." July 1, 2021. https://doi.org/10.1109/TII.2021.3093905.
Full textAkbarzadeh, Aida, Laszlo Erdodi, Siv Hilde Houmb, and Tore Geir Soltvedt. "Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation." International Journal of Information Security, May 14, 2024. http://dx.doi.org/10.1007/s10207-024-00856-6.
Full textCiaramella, Giovanni, Fabio Martinelli, Antonella Santone, and Francesco Mercaldo. "A method for smart grid intrusion detection through explainable deep learning." Journal of Computer Virology and Hacking Techniques 21, no. 1 (2025). https://doi.org/10.1007/s11416-025-00549-1.
Full text