Academic literature on the topic 'SCADA'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SCADA.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SCADA"

1

Beggs, Christopher, and Ryan McGowan. "Fostering SCADA and IT Relationships." International Journal of Cyber Warfare and Terrorism 1, no. 3 (July 2011): 1–11. http://dx.doi.org/10.4018/ijcwt.2011070101.

Full text
Abstract:
In recent years, critical infrastructure utilities have been faced with conflicting attitudes and cultural differences of where SCADA (Supervisory Control and Data Acquisition) and IT fit into an organizational structure. This lack of understanding between SCADA, IT processes, and business operations remains a concern for many utilities within the SCADA community. The importance of SCADA and IT relationships is an area of the SCADA landscape that is often unrecognised. This paper examines the results and findings of a SCADA and IT relationship survey that was undertaken to identify where SCADA operations fit within organizations around the world. It describes several proposed models that define the role and responsibility of SCADA within an organizational structure. It also presents a concept model for SCADA security responsibility and identifies key observations of SCADA and IT working together at the INL Control System Cyber Security Training in Idaho, USA. The main findings of the research suggest that clear defined roles and responsibilities for SCADA operations and SCADA security need to be established and secondly, that immediate cultural driven change is required in order to improve SCADA and IT relationships.
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, Nirmal, Kulwant Singh Rajpurohit, and Er Gaurav Srivastava. "Wireless SCADA." International Journal of Trend in Scientific Research and Development Volume-3, Issue-3 (April 30, 2019): 362–64. http://dx.doi.org/10.31142/ijtsrd22790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thilmany, Jean. "Scada Security?" Mechanical Engineering 134, no. 06 (June 1, 2012): 26–31. http://dx.doi.org/10.1115/1.2012-jun-1.

Full text
Abstract:
This article focuses on the introduction of advance security checks to counter negative publicity of supervisory control and data acquisition (SCADA) systems. The SCADA security concerns have come to be seen as a big deal because the systems can be found within power plants, refineries, pipelines, water treatment plants, and the telecommunications industry, where hackers could do great damage that would affect the public. In light of SCADA security concerns, security researchers have stepped up efforts to find and to call attention to the systems’ vulnerabilities. As national attention has only recently turned to SCADA security, system users have few regulatory specifications by which they must abide. In 2006, the federal government charged the North American Electric Reliability Corp., or NERC, with defining and implementing standards for critical infrastructure protection within the industry. A number of pieces of legislation have been passed and proposed to address software security. The big one right now is the Cybersecurity Act of 2012, which has been introduced by Senator Joseph Lieberman of Connecticut.
APA, Harvard, Vancouver, ISO, and other styles
4

Syamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Full text
Abstract:
<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Syahrizal, Endi, and Hikmatul Amri. "Analisa Rancang Bangun Sistem SCADA Pengontrolan Kelistrikan AC dan PC Laboratorium Pemrograman Gedung Elektro." INOVTEK - Seri Elektro 1, no. 1 (January 7, 2020): 21. http://dx.doi.org/10.35314/ise.v1i1.1171.

Full text
Abstract:
Penelitian ini merupakan pengujian terhadap pengontrolan kelistrikan laboratorium Gedung Elektro. Dengan adanya pengujian ini peneliti dapat melihat perbandingan antara pengontoran kelistrikan tidak menggunakan SCADA mempunyai kekurangan dalam pegawasan di mana dengan menggunakan SCADA bisa dikontrol melalui laptop. Penelitian ini menggunakan PLC Mitsubishi FX2N-48MR dan relay double pole double throw digunakan sebagai alat pengontrolan kelistrikan secara real time. Tujuan penelitian ini adalah untuk mengoptimalkan kelistrikan di laboratorium di mana apabila tidak menggunakan sistem SCADA ketika pada saat jam perkuliahan sering terjadi AC dan PC tidak dimatikan oleh mahasiswa/i. Oleh karena itu dengan adanya sistem SCADA tidak ada lagi AC dan PC yang tidak dimatikan lagi, selain itu sistem SCADA bisa menurukan pemakaian energi listrik yang sangat baik digunakan di ruangan perkuliahan. SCADA dikontrol melalui laptop dengan beban yang begitu besar. Sebelum menggunakan SCADA pemakaiannya tinggi dengan nilai Rp 183,564 sedangkan menggunakan SCADA pemakaian listrik menurun dengan nilai Rp 93,375. Hasil penelitian bahwa pengontrolan dengan sistem SCADA menurunkan biaya pemakaian sebesar 50,87 %.
APA, Harvard, Vancouver, ISO, and other styles
6

Jurnal, Redaksi Tim. "PENGENDALIAN JARINGAN DISTRIBUSI 20 KV DENGAN MENGGUNAKAN SISTEM SCADA." Energi & Kelistrikan 9, no. 1 (November 26, 2018): 41–50. http://dx.doi.org/10.33322/energi.v9i1.56.

Full text
Abstract:
In Indonesia, especially at PT PLN (Persero), SCADA has been known and started to be implemented in the control of electric power systems since the early 1980s in many other countries that are more advanced, SCADA application is growing in line with the development of computer technology and telecommunications. By the time the development is not as sophisticated SCADA now, there are thought to facilitate maneuvers on a system that is simple to use SCADA network we can supply additional power or power outage easily do so overloaded that did not happen. After implementing a SCADA system occurred saving time for 2906 minutes or 48.44 hours, and the frequency of outages 4 times less than that before implementing the SCADA system. This means that the reliability index SAIDI and SAIFI much better at the moment after the implementation of the SCADA system.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "APT Attack Analysis in SCADA Systems." MATEC Web of Conferences 173 (2018): 01010. http://dx.doi.org/10.1051/matecconf/201817301010.

Full text
Abstract:
SCADA (Supervisory Control and Data Acquisition) systems play a significant role in ICS (Industrial Control System). Safety, security and stable operation is crucial to the SCADA system. However, SCADA system currently faces many security threats, of which the most harmful is the APT attack. This paper analyzes the attack surface and its own vulnerabilities of SCADA system, and analyzes the characteristics of APT attack comprehensively. Then the paper dissects the cases of real APT attack thoroughly and gives measures of SCADA security protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Supriyono, Amin, M. Jasa Afroni, and Oktriza Melfazen. "PENERAPAN SCADA BERBASIS IOT UNTUK SIMULATOR KONTROL PANEL PADA CONTOH KASUS PEMBANGKIT LISTRIK TENAGA MIKROHIDRO (PLTM)." JE-UNISLA 7, no. 2 (September 15, 2022): 119. http://dx.doi.org/10.30736/je-unisla.v7i2.889.

Full text
Abstract:
Beberapa PLTM di Indonesia belum dilengkapi dengan sistem SCADA. Ketiadaan sistem SCADA mengakibatkan pengoperasian PLTM harus dilakukan secara konvensional. Dengan sistem SCADA, pengawasan pada peralatan dapat dilakukan secara terus menerus dan terpusat sehingga pengoperasian peralatan bisa lebih optimal. Penambahan/pemasangan suatu alat (sistem SCADA) yang terkait dengan sistem operasi PLTM, tentu memerlukan ijin dari pihak pengelola PLTM. Agar dapat menggambarkan dampak adanya sistem SCADA pada sebuah PLTM tanpa harus melakukan pemasangan secara langsung pada sistem PLTM, maka diperlukan adanya simulator yang dapat digunakan sebagai interface untuk menghubungkan antara sistem SCADA dengan sebuah prototype kontrol panel PLTM yang dapat menggambarkan proses atau alur pengoperasian sebuah PLTM secara ringkas. Metode penelitian yang digunakan menggunakan metode eksperimental. Penelitian ini menghasilkan sebuah simulator kontrol panel berbasis SCADA yang menggunakan IoT sebagai kontroller serta internet sebagai perantara untuk menghubungkan manusia dengan simulator. Adapun kesimpulan dari penelitian ini yaitu Simulator dianggap membantu dalam mempelajari bagaimana mendesain sebuah sistem SCADA dengan menggunakan IoT, serta menjelaskan bagaimana alur proses PLTM dan apa saja yang dikontrol dan diawasi.
APA, Harvard, Vancouver, ISO, and other styles
9

Tükez, Enes Talha, and Adnan KAYA. "SCADA System for Next-Generation Smart Factory Environments." ICONTECH INTERNATIONAL JOURNAL 6, no. 1 (March 20, 2022): 48–52. http://dx.doi.org/10.46291/icontechvol6iss1pp48-52.

Full text
Abstract:
Today, in factories, production is spread into a wide area and became complicated. Complicated production requires a better monitoring and control system to improve efficiency. For this purpose, SCADA systems are used. SCADA systems allow industries to monitor, control and access to real-time data and data logging. Nowadays, all large-scale industries have SCADA systems. The cost of the SCADA system makes it unreachable for small and medium-size industries but a SCADA system that is designed by using C# programming language would be cheaper and could perform the same. In this study, a SCADA system has been developed to monitor and control the smart model factory system in AFSUAM. SCADA interface is created by using C# programming language and the communication between PLC and the SCADA is set by using Mitsubishi MX Component tool. With the developed SCADA system, the process of a product entering the factory as raw material, going through several processes and becoming a product from the supply chain to the distributor has been modeled on a sample marble factory model, and a graphical user interface has been created considering the purposes such as real-time monitoring, controlling, data logging and preventing errors in the context of this model.
APA, Harvard, Vancouver, ISO, and other styles
10

Vujić, Marko, and Vladimir Katić. "PRIMENA SCADA SISTEMA U SMART GRIDU." Zbornik radova Fakulteta tehničkih nauka u Novom Sadu 34, no. 03 (February 25, 2019): 474–77. http://dx.doi.org/10.24867/02be03vujic.

Full text
Abstract:
U okviru ovog rada predstavljena je uloga SCADA sistema u Smart Grid-u. Opisana je arhitektura SCADA softvera koji zadovoljava potrebe Smart Grida. Predstavljeni su parametri i kriterijumi koje moraju da ispune proizvođači SCADA softvera kako bi zadovoljili zahteve klijenata. Predstavljeni su najbolji SCADA softveri i pojedinačno anlizirani u pogledu na ispunjavanje Smart Grid standard.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SCADA"

1

Brandi, Denis. "SCADA Lite View." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6583/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gomes, Miguel Ferreira Pereira. "Canal SCADA na Web." Master's thesis, Universidade do Porto. Reitoria, 2002. http://hdl.handle.net/10216/10358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Studený, Radim. "Simulátor komunikace protokolů SCADA." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377061.

Full text
Abstract:
This work describes DNP3, IEC-60870, IEC-61850 communication protocols and their implementing in SCADA systems. It further describes communication of these protocols between RaspberryPi as a slave device and Personal Computer as a master device.
APA, Harvard, Vancouver, ISO, and other styles
4

Gomes, Miguel Ferreira Pereira. "Canal SCADA na Web." Dissertação, Universidade do Porto. Reitoria, 2002. http://hdl.handle.net/10216/10358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Strand, Simon. "SCADA-system till Unnefors sågverk." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96319.

Full text
Abstract:
Södra Timber AB är ett företag som ägs av nordens ca 35 000 skogsägare. Företaget tar hand om nersågat skog som fraktas till nått av Södra Timber AB:s 10 sågverk. Här tar de hand om timret och tillverkar virkesråvara, trävaror och biobränsle. Sågverket önskar att till sitt timmerintaget skaffa sig ett SCADA-system ( Supervisory Control And Data Acquisition). Detta är ett övervakningssystem som kan styra och övervaka produktionen. Ett SCADA-system kan t.ex användas för att styra motorer och avläsa mätvärden som förekommer i produktion. På dataskärmen kan man få uppgifter som ström, spänning, effekt eller om motorn håller på att gå sönder. Med hjälp av ett SCADA-system skulle man med lätthet hitta. t.ex. motorer som gått sönder eller en fotocell som gått sönder och på så vis stoppa linjen innan något händer. På det viset sparar man både tid och pengar. Syftet med detta examensprojekt var att jämföra olika SCADA-system. Jämförelsen gjordes med avseende på pris, prestanda och möjligheter att bygga ut systemet mm Resultatet blev ett dokument med information om bla. SCADA-systemens priser, möjligheter till support och uppgraderings möjligheter till utbyggnad av systemen. Resultatet av detta examensprojekt ger ej tillräckligt underlag för att bedöma vilket av de 3 undersökta SCADA-systemen som är bäst för Unnefors sågverk. För att kunna utvärdera det skulle man behöva mer tid till arbetet.
APA, Harvard, Vancouver, ISO, and other styles
6

Stolpe, Pär. "Evaluation and Implementation of SCADA Systems." Thesis, Linköping University, Department of Electrical Engineering, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-971.

Full text
Abstract:

In this bachelor thesis a comparison and evaluation of six different process visualization programs has been made. The purpose of the comparison is to find a suitable program for an experiment in control, held at Linköpings universitet, but also to get an overview of the market at the time this report was written.

After the evaluation an implementation is carried out with the programs that were bought. RSLogix, InTouch, InSQL and SuiteVoyager, one programming tool, one visualization tool, a database-manager and a web-portal for interaction over the Internet.

APA, Harvard, Vancouver, ISO, and other styles
7

Rodrigues, Aniket. "SCADA security device: design and implementation." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5195.

Full text
Abstract:
Securing SCADA systems is a critical aspect of Smart grid security. As sophisticated attacks continue to target industrial systems, the focus should be on planning and developing new security techniques that will adapt to the SCADA environment and protocols. Traditional SCADA protocols such as DNP3, Modbus and ICCP do not support encryption, authentication and data integrity in their native form. Although they can be secured with VPN tunnels, IPSEC adds significant network overhead and complexity to the end hosts. SCADA devices may lack the computing resources to implement this kind of technique. In this thesis, a security design is proposed that can help make communications between the master stations and slave devices in a SCADA network secure without putting additional overhead on the remote devices. This research designs a SCADA Security Device (SSD), which can work in conjunction with other network elements to implement a secure architecture for SCADA protocols. Several components of the SSD were implemented and tested during this research to evaluate the security features in a SCADA network.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
APA, Harvard, Vancouver, ISO, and other styles
8

Valentine, Sidney E. "PLC code vulnerabilities through SCADA systems." Thesis, University of South Carolina, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=3561883.

Full text
Abstract:

Supervisory Control and Data Acquisition (SCADA) systems are widely used in automated manufacturing and in all areas of our nation's infrastructure. Applications range from chemical processes and water treatment facilities to oil and gas production and electric power generation and distribution. Current research on SCADA system security focuses on the primary SCADA components and targets network centric attacks. Security risks via attacks against the peripheral devices such as the Programmable Logic Controllers (PLCs) have not been sufficiently addressed. Our research results address the need to develop PLC applications that are correct, safe and secure. This research provides an analysis of software safety and security threats. We develop countermeasures that are compatible with the existing PLC technologies. We study both intentional and unintentional software errors and propose methods to prevent them. The main contributions of this dissertation are: 1). Develop a taxonomy of software errors and attacks in ladder logic 2). Model ladder logic vulnerabilities 3). Develop security design patterns to avoid software vulnerabilities and incorrect practices 4). Implement a proof of concept static analysis tool which detects the vulnerabilities in the PLC code and recommend corresponding design patterns.

APA, Harvard, Vancouver, ISO, and other styles
9

Udd, Robert. "Anomaly Detection in SCADA Network Traffic." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-122680.

Full text
Abstract:
Critical infrastructure provides us with the most important parts of modern society, electricity, water and transport. To increase efficiency and to meet new demands from the customer remote monitoring and control of the systems is necessary. This opens new ways for an attacker to reach the Supervisory Control And Data Acquisition (SCADA) systems that control and monitors the physical processes involved. This also increases the need for security features specially designed for these settings. Anomaly-based detection is a technique suitable for the more deterministic SCADA systems. This thesis uses a combination of two techniques to detect anomalies. The first technique is an automatic whitelist that learns the behavior of the network flows. The second technique utilizes the differences in arrival times of the network packets. A prototype anomaly detector has been developed in Bro. To analyze the IEC 60870-5-104 protocol a new parser for Bro was also developed. The resulting anomaly detector was able to achieve a high detection rate for three of the four different types of attacks evaluated. The studied methods of detection are promising when used in a highly deterministic setting, such as a SCADA system.
APA, Harvard, Vancouver, ISO, and other styles
10

Сердюк, О. С. "SCADA — система водозабору та очищення води." Master's thesis, Сумський державний університет, 2018. http://essuir.sumdu.edu.ua/handle/123456789/71278.

Full text
Abstract:
Робота присвячена дослідженню сучасних методів створення засобів водозабезпечення та очищення води використанням SCADA технологій. Метою роботи є аналіз існуючих підходів до створення систем водопостачання та їх реалізація. У роботі було розглянуто відомі методи побудови систем. Проаналізовано реалізацію цих підходів на прикладі сучасних систем прогнозування.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SCADA"

1

Services, CSR Market Data, ed. SCADA/EMS. Tulsa, OK (P.O. Box 2053, Tulsa 74101-9863): PennWell Pub. Co., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Krutz, Ronald L. Securing SCADA systems. Indianapolis, IN: Wiley Technology Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Krutz, Ronald L. Securing SCADA systems. Indianapolis, IN: Wiley Pub., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Krutz, Ronald L. Securing SCADA Systems. New York: John Wiley & Sons, Ltd., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Monika, Deswal, ed. PLC And SCADA. New Delhi, India: University Science Press, Laxmi Publications, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Securing SCADA systems. Indianapolis, IN: Wiley Technology Pub., 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Edwin, Wright, ed. Practical SCADA for industry. Oxford: Newnes, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Techno security's guide to securing SCADA. Rockland, Mass: Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boyer, Stuart A. SCADA: Supervisory control and data acquisition. Research Triangle Park, N.C: Instrument Society of America, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

America, Instrument Society of, ed. SCADA: Supervisory control and data acquisition. Research Triangle Park, N.C: Instrument Society of America, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "SCADA"

1

Maras, Marie-Helen. "SCADA." In Encyclopedia of Security and Emergency Management, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_240-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Spellman, Frank R. "SCADA." In Fundamentals of Public Utilities Management, 135–52. First edition. | Boca Raton, FL : CRC Press, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003089599-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Maras, Marie-Helen. "SCADA." In Encyclopedia of Security and Emergency Management, 863–65. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kalogeraki, Eleni-Maria, Nineta Polemi, Spyridon Papastergiou, and Themis Panayiotopoulos. "Modeling SCADA Attacks." In Lecture Notes in Networks and Systems, 47–55. Singapore: Springer Singapore, 2017. http://dx.doi.org/10.1007/978-981-10-6916-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rrushi, Julian L. "SCADA Protocol Vulnerabilities." In Critical Infrastructure Protection, 150–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-28920-0_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pabalkar, Vanishree, and Rajkumar Verma. "SCADA in Healthcare." In ICT Infrastructure and Computing, 91–102. Singapore: Springer Nature Singapore, 2023. http://dx.doi.org/10.1007/978-981-99-4932-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fovino, Igor Nai. "SCADA System Cyber Security." In Secure Smart Embedded Devices, Platforms and Applications, 451–71. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7915-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bazydło, Piotr, and Roman Szewczyk. "Integrated SCADA Checkweigher System." In Advances in Intelligent Systems and Computing, 11–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15835-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sekar, Maris. "SCADA and Operational Technology." In Machine Learning for Auditors, 131–35. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-8051-5_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lin, C. Y., and Simin Nadjm-Tehrani. "A Comparative Analysis of Emulated and Real IEC-104 Spontaneous Traffic in Power System Networks." In Cyber-Physical Security for Critical Infrastructures Protection, 207–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69781-5_14.

Full text
Abstract:
AbstractSupervisory and Data Acquisition (SCADA) systems control and monitor modern power networks. As attacks targeting SCADA systems are increasing, significant research is conducted to defend SCADA networks including variations of anomaly detection. Due to the sensitivity of real data, many defence mechanisms have been tested only in small testbeds or emulated traffic that were designed with assumptions on how SCADA systems behave. This work provides a timing characterization of IEC-104 spontaneous traffic and compares the results from emulated traffic and real traffic to verify if the network characteristics appearing in testbeds and emulated traffic coincide with real traffic. Among three verified characteristics, two of them appear in the real dataset but in a less regular way, and one does not appear in the collected real data. The insights from these observations are discussed in terms of presumed differences between emulated and real traffic and how those differences are generated.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SCADA"

1

Wigmore, M. "Integrated view of SCADA [SCADA systems]." In 6th IET Water Event. IEE, 2008. http://dx.doi.org/10.1049/ic:20080139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ghaleb, Asem, Sami Zhioua, and Ahmad Almulhem. "SCADA-SST: a SCADA security testbed." In 2016 World Congress on Industrial Control Systems Security (WCICSS). IEEE, 2016. http://dx.doi.org/10.1109/wcicss.2016.7882610.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Clark, Ian M., and Glenn Shaw. "Pipeline Control: Merging SCADA and Gas Measurement." In 1998 2nd International Pipeline Conference. American Society of Mechanical Engineers, 1998. http://dx.doi.org/10.1115/ipc1998-2106.

Full text
Abstract:
This paper discusses the merits of merging SCADA1 and gas measurement from a technical and economical perspective. Because traditional SCADA is largely limited to control room data used only for day to day operational purposes, the real-time metering data is not often utilized in the external revenue-generation business systems of the organization. In many cases, entirely separate measurement systems are utilized in isolation which often have few, if any, ties to the SCADA system which is capable of collecting pertinent measurement information. Measurement data validation provides automatic data validation of flow measurement data upon retrieval from telemetered or non-telemetered data sources. Row measurement data can be supplied from field devices such as electronic flow computers or from other sources of flow measurement data such as manual operator entry, third party collection systems, chart integration sources, etc. Flow measurement data undergoes a series of automated validation tests including single-run limit checking, meter run comparisons (at a given metering station) and historical validation tests (such as searching for frozen values). The outcome of these tests determines the data quality code assigned to each flow measurement reading (indicating the results of validation tests). When combined with a real-time processing and data acquisition engine in a SCADA system that is capable of communicating with field devices via leased lines, VSAT, radio, dial-up, etc., many benefits can be realized.
APA, Harvard, Vancouver, ISO, and other styles
4

Al-tamimi, Aref. "Secured Scada System." In Qatar Foundation Annual Research Conference Proceedings. Hamad bin Khalifa University Press (HBKU Press), 2014. http://dx.doi.org/10.5339/qfarc.2014.itpp1036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kirsch, Jonathan, Stuart Goose, Yair Amir, and Paul Skare. "Toward survivable SCADA." In the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rodrigues, Aniket, Tish Best, and Ravi Pendse. "SCADA security device." In the Seventh Annual Workshop. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2179298.2179325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Stoian, I., E. Stancel, S. Ignat, Sz Balogh, and O. Dancea. "Federative SCADA consideration." In 2010 IEEE International Conference on Automation, Quality and Testing, Robotics (AQTR 2010). IEEE, 2010. http://dx.doi.org/10.1109/aqtr.2010.5520682.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Saurav, Sumit Kumar, Palem Benny Sudhakar, Katta Jagan Mohan, R. Senthil Kumar, and S. Bindhumadhava Bapu. "SCADA WebView: A State-of-the-Art Enterprise Transmission SCADA Engine." In 2021 IEEE 18th India Council International Conference (INDICON). IEEE, 2021. http://dx.doi.org/10.1109/indicon52576.2021.9691604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lin, Hui, Adam Slagell, Catello Di Martino, Zbigniew Kalbarczyk, and Ravishankar K. Iyer. "Adapting Bro into SCADA." In the Eighth Annual Cyber Security and Information Intelligence Research Workshop. New York, New York, USA: ACM Press, 2013. http://dx.doi.org/10.1145/2459976.2459982.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Robinson, Michael. "The SCADA Threat Landscape." In 1st International Symposium for ICS & SCADA Cyber Security Research 2013 (ICS-CSR 2013). BCS Learning & Development, 2013. http://dx.doi.org/10.14236/ewic/icscsr2013.4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SCADA"

1

CARLSON, ROLF E. Sandia SCADA Program -- High Surety SCADA LDRD Final Report. Office of Scientific and Technical Information (OSTI), April 2002. http://dx.doi.org/10.2172/800787.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

BEAVER, CHERYL L., DONALD R. GALLUP, WILLIAM D. NEUMANN, and MARK D. TORGERSON. Key Management for SCADA. Office of Scientific and Technical Information (OSTI), March 2002. http://dx.doi.org/10.2172/792866.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Author, Not Given. INL-Telvent SCADA Test Bed. Office of Scientific and Technical Information (OSTI), March 2011. http://dx.doi.org/10.2172/1009418.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Dale, Gregory E., Michael Andrew Holloway, Scott A. Baily, Keith Albert Woloshun, and Robert Mitchell Jr Wheat. Production Facility SCADA Design Report. Office of Scientific and Technical Information (OSTI), March 2015. http://dx.doi.org/10.2172/1209286.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ken Barnes, Briam Johnson, and Reva Nickelson. Introduction to SCADA Protection and Vulnerabilities. Office of Scientific and Technical Information (OSTI), March 2004. http://dx.doi.org/10.2172/911209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Stokes, Nathan. Substation Circuit Breaker SCADA Cut-Over. Office of Scientific and Technical Information (OSTI), April 2018. http://dx.doi.org/10.2172/1478524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

O' Neal, T., and M. Minard. SCADA S200 and S300 Project Sketches. Office of Scientific and Technical Information (OSTI), December 2018. http://dx.doi.org/10.2172/1491973.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Author, Not Given. General Electric/INEEL SCADA Test Bed. Office of Scientific and Technical Information (OSTI), June 2009. http://dx.doi.org/10.2172/957460.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Author, Not Given. Itron Open Way Security Assessment -- SCADA. Office of Scientific and Technical Information (OSTI), January 2012. http://dx.doi.org/10.2172/1034124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martin, Shawn, Carsten Westergaard, Jonathan White, and Benjamin Karlson. Visualizing Wind Farm Wakes Using SCADA Data. Office of Scientific and Technical Information (OSTI), May 2016. http://dx.doi.org/10.2172/1561493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography