Academic literature on the topic 'SCADA'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SCADA.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SCADA"
Beggs, Christopher, and Ryan McGowan. "Fostering SCADA and IT Relationships." International Journal of Cyber Warfare and Terrorism 1, no. 3 (July 2011): 1–11. http://dx.doi.org/10.4018/ijcwt.2011070101.
Full textKumar, Nirmal, Kulwant Singh Rajpurohit, and Er Gaurav Srivastava. "Wireless SCADA." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 362–64. http://dx.doi.org/10.31142/ijtsrd22790.
Full textThilmany, Jean. "Scada Security?" Mechanical Engineering 134, no. 06 (June 1, 2012): 26–31. http://dx.doi.org/10.1115/1.2012-jun-1.
Full textSyamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Full textSyahrizal, Endi, and Hikmatul Amri. "Analisa Rancang Bangun Sistem SCADA Pengontrolan Kelistrikan AC dan PC Laboratorium Pemrograman Gedung Elektro." INOVTEK - Seri Elektro 1, no. 1 (January 7, 2020): 21. http://dx.doi.org/10.35314/ise.v1i1.1171.
Full textJurnal, Redaksi Tim. "PENGENDALIAN JARINGAN DISTRIBUSI 20 KV DENGAN MENGGUNAKAN SISTEM SCADA." Energi & Kelistrikan 9, no. 1 (November 26, 2018): 41–50. http://dx.doi.org/10.33322/energi.v9i1.56.
Full textZhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "APT Attack Analysis in SCADA Systems." MATEC Web of Conferences 173 (2018): 01010. http://dx.doi.org/10.1051/matecconf/201817301010.
Full textSupriyono, Amin, M. Jasa Afroni, and Oktriza Melfazen. "PENERAPAN SCADA BERBASIS IOT UNTUK SIMULATOR KONTROL PANEL PADA CONTOH KASUS PEMBANGKIT LISTRIK TENAGA MIKROHIDRO (PLTM)." JE-UNISLA 7, no. 2 (September 15, 2022): 119. http://dx.doi.org/10.30736/je-unisla.v7i2.889.
Full textTükez, Enes Talha, and Adnan KAYA. "SCADA System for Next-Generation Smart Factory Environments." ICONTECH INTERNATIONAL JOURNAL 6, no. 1 (March 20, 2022): 48–52. http://dx.doi.org/10.46291/icontechvol6iss1pp48-52.
Full textVujić, Marko, and Vladimir Katić. "PRIMENA SCADA SISTEMA U SMART GRIDU." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 03 (February 25, 2019): 474–77. http://dx.doi.org/10.24867/02be03vujic.
Full textDissertations / Theses on the topic "SCADA"
Brandi, Denis. "SCADA Lite View." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6583/.
Full textGomes, Miguel Ferreira Pereira. "Canal SCADA na Web." Master's thesis, Universidade do Porto. Reitoria, 2002. http://hdl.handle.net/10216/10358.
Full textStudený, Radim. "Simulátor komunikace protokolů SCADA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377061.
Full textGomes, Miguel Ferreira Pereira. "Canal SCADA na Web." Dissertação, Universidade do Porto. Reitoria, 2002. http://hdl.handle.net/10216/10358.
Full textStrand, Simon. "SCADA-system till Unnefors sågverk." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96319.
Full textStolpe, Pär. "Evaluation and Implementation of SCADA Systems." Thesis, Linköping University, Department of Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-971.
Full textIn this bachelor thesis a comparison and evaluation of six different process visualization programs has been made. The purpose of the comparison is to find a suitable program for an experiment in control, held at Linköpings universitet, but also to get an overview of the market at the time this report was written.
After the evaluation an implementation is carried out with the programs that were bought. RSLogix, InTouch, InSQL and SuiteVoyager, one programming tool, one visualization tool, a database-manager and a web-portal for interaction over the Internet.
Rodrigues, Aniket. "SCADA security device: design and implementation." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5195.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
Valentine, Sidney E. "PLC code vulnerabilities through SCADA systems." Thesis, University of South Carolina, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3561883.
Full textSupervisory Control and Data Acquisition (SCADA) systems are widely used in automated manufacturing and in all areas of our nation's infrastructure. Applications range from chemical processes and water treatment facilities to oil and gas production and electric power generation and distribution. Current research on SCADA system security focuses on the primary SCADA components and targets network centric attacks. Security risks via attacks against the peripheral devices such as the Programmable Logic Controllers (PLCs) have not been sufficiently addressed. Our research results address the need to develop PLC applications that are correct, safe and secure. This research provides an analysis of software safety and security threats. We develop countermeasures that are compatible with the existing PLC technologies. We study both intentional and unintentional software errors and propose methods to prevent them. The main contributions of this dissertation are: 1). Develop a taxonomy of software errors and attacks in ladder logic 2). Model ladder logic vulnerabilities 3). Develop security design patterns to avoid software vulnerabilities and incorrect practices 4). Implement a proof of concept static analysis tool which detects the vulnerabilities in the PLC code and recommend corresponding design patterns.
Udd, Robert. "Anomaly Detection in SCADA Network Traffic." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122680.
Full textСердюк, О. С. "SCADA — система водозабору та очищення води." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/71278.
Full textBooks on the topic "SCADA"
Services, CSR Market Data, ed. SCADA/EMS. Tulsa, OK (P.O. Box 2053, Tulsa 74101-9863): PennWell Pub. Co., 1994.
Find full textKrutz, Ronald L. Securing SCADA systems. Indianapolis, IN: Wiley Technology Pub., 2006.
Find full textMonika, Deswal, ed. PLC And SCADA. New Delhi, India: University Science Press, Laxmi Publications, 2015.
Find full textBoyer, Stuart A. SCADA: Supervisory control and data acquisition. Research Triangle Park, N.C: Instrument Society of America, 1993.
Find full textAmerica, Instrument Society of, ed. SCADA: Supervisory control and data acquisition. Research Triangle Park, N.C: Instrument Society of America, 1993.
Find full textBook chapters on the topic "SCADA"
Maras, Marie-Helen. "SCADA." In Encyclopedia of Security and Emergency Management, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_240-1.
Full textSpellman, Frank R. "SCADA." In Fundamentals of Public Utilities Management, 135–52. First edition. | Boca Raton, FL : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003089599-9.
Full textMaras, Marie-Helen. "SCADA." In Encyclopedia of Security and Emergency Management, 863–65. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_240.
Full textKalogeraki, Eleni-Maria, Nineta Polemi, Spyridon Papastergiou, and Themis Panayiotopoulos. "Modeling SCADA Attacks." In Lecture Notes in Networks and Systems, 47–55. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6916-1_5.
Full textRrushi, Julian L. "SCADA Protocol Vulnerabilities." In Critical Infrastructure Protection, 150–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28920-0_8.
Full textPabalkar, Vanishree, and Rajkumar Verma. "SCADA in Healthcare." In ICT Infrastructure and Computing, 91–102. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-4932-8_10.
Full textFovino, Igor Nai. "SCADA System Cyber Security." In Secure Smart Embedded Devices, Platforms and Applications, 451–71. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7915-4_20.
Full textBazydło, Piotr, and Roman Szewczyk. "Integrated SCADA Checkweigher System." In Advances in Intelligent Systems and Computing, 11–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15835-8_2.
Full textSekar, Maris. "SCADA and Operational Technology." In Machine Learning for Auditors, 131–35. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8051-5_12.
Full textLin, C. Y., and Simin Nadjm-Tehrani. "A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks." In Cyber-Physical Security for Critical Infrastructures Protection, 207–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_14.
Full textConference papers on the topic "SCADA"
Wigmore, M. "Integrated view of SCADA [SCADA systems]." In 6th IET Water Event. IEE, 2008. http://dx.doi.org/10.1049/ic:20080139.
Full textGhaleb, Asem, Sami Zhioua, and Ahmad Almulhem. "SCADA-SST: a SCADA security testbed." In 2016 World Congress on Industrial Control Systems Security (WCICSS). IEEE, 2016. http://dx.doi.org/10.1109/wcicss.2016.7882610.
Full textClark, Ian M., and Glenn Shaw. "Pipeline Control: Merging SCADA and Gas Measurement." In 1998 2nd International Pipeline Conference. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/ipc1998-2106.
Full textAl-tamimi, Aref. "Secured Scada System." In Qatar Foundation Annual Research Conference Proceedings. Hamad bin Khalifa University Press (HBKU Press), 2014. http://dx.doi.org/10.5339/qfarc.2014.itpp1036.
Full textKirsch, Jonathan, Stuart Goose, Yair Amir, and Paul Skare. "Toward survivable SCADA." In the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179321.
Full textRodrigues, Aniket, Tish Best, and Ravi Pendse. "SCADA security device." In the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179325.
Full textStoian, I., E. Stancel, S. Ignat, Sz Balogh, and O. Dancea. "Federative SCADA consideration." In 2010 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2010). IEEE, 2010. http://dx.doi.org/10.1109/aqtr.2010.5520682.
Full textSaurav, Sumit Kumar, Palem Benny Sudhakar, Katta Jagan Mohan, R. Senthil Kumar, and S. Bindhumadhava Bapu. "SCADA WebView: A State-of-the-Art Enterprise Transmission SCADA Engine." In 2021 IEEE 18th India Council International Conference (INDICON). IEEE, 2021. http://dx.doi.org/10.1109/indicon52576.2021.9691604.
Full textLin, Hui, Adam Slagell, Catello Di Martino, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. "Adapting Bro into SCADA." In the Eighth Annual Cyber Security and Information Intelligence Research Workshop. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2459976.2459982.
Full textRobinson, Michael. "The SCADA Threat Landscape." In 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013). BCS Learning & Development, 2013. http://dx.doi.org/10.14236/ewic/icscsr2013.4.
Full textReports on the topic "SCADA"
CARLSON, ROLF E. Sandia SCADA Program -- High Surety SCADA LDRD Final Report. Office of Scientific and Technical Information (OSTI), April 2002. http://dx.doi.org/10.2172/800787.
Full textBEAVER, CHERYL L., DONALD R. GALLUP, WILLIAM D. NEUMANN, and MARK D. TORGERSON. Key Management for SCADA. Office of Scientific and Technical Information (OSTI), March 2002. http://dx.doi.org/10.2172/792866.
Full textAuthor, Not Given. INL-Telvent SCADA Test Bed. Office of Scientific and Technical Information (OSTI), March 2011. http://dx.doi.org/10.2172/1009418.
Full textDale, Gregory E., Michael Andrew Holloway, Scott A. Baily, Keith Albert Woloshun, and Robert Mitchell Jr Wheat. Production Facility SCADA Design Report. Office of Scientific and Technical Information (OSTI), March 2015. http://dx.doi.org/10.2172/1209286.
Full textKen Barnes, Briam Johnson, and Reva Nickelson. Introduction to SCADA Protection and Vulnerabilities. Office of Scientific and Technical Information (OSTI), March 2004. http://dx.doi.org/10.2172/911209.
Full textStokes, Nathan. Substation Circuit Breaker SCADA Cut-Over. Office of Scientific and Technical Information (OSTI), April 2018. http://dx.doi.org/10.2172/1478524.
Full textO' Neal, T., and M. Minard. SCADA S200 and S300 Project Sketches. Office of Scientific and Technical Information (OSTI), December 2018. http://dx.doi.org/10.2172/1491973.
Full textAuthor, Not Given. General Electric/INEEL SCADA Test Bed. Office of Scientific and Technical Information (OSTI), June 2009. http://dx.doi.org/10.2172/957460.
Full textAuthor, Not Given. Itron Open Way Security Assessment -- SCADA. Office of Scientific and Technical Information (OSTI), January 2012. http://dx.doi.org/10.2172/1034124.
Full textMartin, Shawn, Carsten Westergaard, Jonathan White, and Benjamin Karlson. Visualizing Wind Farm Wakes Using SCADA Data. Office of Scientific and Technical Information (OSTI), May 2016. http://dx.doi.org/10.2172/1561493.
Full text