Academic literature on the topic 'SCADA-system'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SCADA-system.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "SCADA-system"

1

Layal, Arvinder Singh, Manan Shah, Deep Shah, and Kashyap Joshi. "Automatic Wireless SCADA System." International Journal of Engineering Trends and Technology 34, no. 2 (April 25, 2016): 81–84. http://dx.doi.org/10.14445/22315381/ijett-v34p217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wada, Ronald N., Edward H. P. Chan, and Kazu Hayashida. "Honolulu's New SCADA System." Journal - American Water Works Association 78, no. 8 (August 1986): 43–48. http://dx.doi.org/10.1002/j.1551-8833.1986.tb05797.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Allafi, Ibrahim, and Tariq Iqbal. "Low-Cost SCADA System Using Arduino and Reliance SCADA for a Stand-Alone Photovoltaic System." Journal of Solar Energy 2018 (May 2, 2018): 1–8. http://dx.doi.org/10.1155/2018/3140309.

Full text
Abstract:
SCADA (supervisory control and data acquisition) systems are currently employed in many applications, such as home automation, greenhouse automation, and hybrid power systems. Commercial SCADA systems are costly to set up and maintain; therefore those are not used for small renewable energy systems. This paper demonstrates applying Reliance SCADA and Arduino Uno on a small photovoltaic (PV) power system to monitor the PV current, voltage, and battery, as well as efficiency. The designed system uses low-cost sensors, an Arduino Uno microcontroller, and free Reliance SCADA software. The Arduino Uno microcontroller collects data from sensors and communicates with a computer through a USB cable. Uno has been programmed to transmit data to Reliance SCADA on PC. In addition, Modbus library has been uploaded on Arduino to allow communication between the Arduino and our SCADA system by using MODBUS RTU protocol. The results of the experiments demonstrate that SCADA works in real time and can be effectively used in monitoring a solar energy system.
APA, Harvard, Vancouver, ISO, and other styles
4

Omarov, A., and V. Barabanov. "DEVELOPMENT OF AN ENTERPRISE POWER EQUIPMENT MONITORING SYSTEM USING THE WINCC SCADA SYSTEM." IZVESTIA VOLGOGRAD STATE TECHNICAL UNIVERSITY, no. 3(238) (April 21, 2020): 76–79. http://dx.doi.org/10.35211/1990-5297-2020-3-238-76-79.

Full text
Abstract:
The SCADA system was developed. The development process is described. The main elements that make up the SCADA system are described. The algorithm of functioning of the SCADA system, its capabilities, and the main advantages of its use were described in detail.
APA, Harvard, Vancouver, ISO, and other styles
5

Syamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (May 1, 2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Full text
Abstract:
<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature review, this paper firstly discusses current security issues of SCADA system and look closely benchmark dataset and SCADA security holes, followed by SCADA traffic anomaly recognition using artificial intelligence techniques and visual traffic monitoring system. Then, touches on the encryption technique suitable for the SCADA network. In the end, this paper gives the trend of SCADA IDS in the future and provides a proposed model to generate a reliable IDS, this model is proposed based on the investigation of previous researches. This paper focuses on SCADA systems that use IEC 60870-5-104 (IEC 104) protocol and distributed network protocol version 3 (DNP3) protocol as many SCADA systems use these two protocols.</p>
APA, Harvard, Vancouver, ISO, and other styles
6

Tükez, Enes Talha, and Adnan KAYA. "SCADA System for Next-Generation Smart Factory Environments." ICONTECH INTERNATIONAL JOURNAL 6, no. 1 (March 20, 2022): 48–52. http://dx.doi.org/10.46291/icontechvol6iss1pp48-52.

Full text
Abstract:
Today, in factories, production is spread into a wide area and became complicated. Complicated production requires a better monitoring and control system to improve efficiency. For this purpose, SCADA systems are used. SCADA systems allow industries to monitor, control and access to real-time data and data logging. Nowadays, all large-scale industries have SCADA systems. The cost of the SCADA system makes it unreachable for small and medium-size industries but a SCADA system that is designed by using C# programming language would be cheaper and could perform the same. In this study, a SCADA system has been developed to monitor and control the smart model factory system in AFSUAM. SCADA interface is created by using C# programming language and the communication between PLC and the SCADA is set by using Mitsubishi MX Component tool. With the developed SCADA system, the process of a product entering the factory as raw material, going through several processes and becoming a product from the supply chain to the distributor has been modeled on a sample marble factory model, and a graphical user interface has been created considering the purposes such as real-time monitoring, controlling, data logging and preventing errors in the context of this model.
APA, Harvard, Vancouver, ISO, and other styles
7

Zhou, Xiaojun, Zhen Xu, Liming Wang, Kai Chen, Cong Chen, and Wei Zhang. "APT Attack Analysis in SCADA Systems." MATEC Web of Conferences 173 (2018): 01010. http://dx.doi.org/10.1051/matecconf/201817301010.

Full text
Abstract:
SCADA (Supervisory Control and Data Acquisition) systems play a significant role in ICS (Industrial Control System). Safety, security and stable operation is crucial to the SCADA system. However, SCADA system currently faces many security threats, of which the most harmful is the APT attack. This paper analyzes the attack surface and its own vulnerabilities of SCADA system, and analyzes the characteristics of APT attack comprehensively. Then the paper dissects the cases of real APT attack thoroughly and gives measures of SCADA security protection.
APA, Harvard, Vancouver, ISO, and other styles
8

Cha, Jay. "Implementing a New SCADA System." Proceedings of the Water Environment Federation 2010, no. 6 (January 1, 2010): 53–57. http://dx.doi.org/10.2175/193864710798216369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ji, Seungwon, Wongi Lee, TaeGwang Ko, Sohee Park, Gooyeon Oh, Jongmin Kim, and DongMin Kim. "Blockchain-based SCADA system security." Jouranl of Information and Security 19, no. 5 (December 31, 2019): 55–61. http://dx.doi.org/10.33778/kcsa.2019.19.5.055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Heggo, A. A. "SCADA BASED POWER SYSTEM CONTROL." ERJ. Engineering Research Journal 22, no. 3 (October 1, 1999): 13–23. http://dx.doi.org/10.21608/erjm.1999.72749.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "SCADA-system"

1

Strand, Simon. "SCADA-system till Unnefors sågverk." Thesis, Linköpings universitet, Institutionen för teknik och naturvetenskap, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96319.

Full text
Abstract:
Södra Timber AB är ett företag som ägs av nordens ca 35 000 skogsägare. Företaget tar hand om nersågat skog som fraktas till nått av Södra Timber AB:s 10 sågverk. Här tar de hand om timret och tillverkar virkesråvara, trävaror och biobränsle. Sågverket önskar att till sitt timmerintaget skaffa sig ett SCADA-system ( Supervisory Control And Data Acquisition). Detta är ett övervakningssystem som kan styra och övervaka produktionen. Ett SCADA-system kan t.ex användas för att styra motorer och avläsa mätvärden som förekommer i produktion. På dataskärmen kan man få uppgifter som ström, spänning, effekt eller om motorn håller på att gå sönder. Med hjälp av ett SCADA-system skulle man med lätthet hitta. t.ex. motorer som gått sönder eller en fotocell som gått sönder och på så vis stoppa linjen innan något händer. På det viset sparar man både tid och pengar. Syftet med detta examensprojekt var att jämföra olika SCADA-system. Jämförelsen gjordes med avseende på pris, prestanda och möjligheter att bygga ut systemet mm Resultatet blev ett dokument med information om bla. SCADA-systemens priser, möjligheter till support och uppgraderings möjligheter till utbyggnad av systemen. Resultatet av detta examensprojekt ger ej tillräckligt underlag för att bedöma vilket av de 3 undersökta SCADA-systemen som är bäst för Unnefors sågverk. För att kunna utvärdera det skulle man behöva mer tid till arbetet.
APA, Harvard, Vancouver, ISO, and other styles
2

Appelgren, Filiph. "Power System Software Development : with possible SCADA System Integration." Thesis, Uppsala universitet, Elektricitetslära, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-233233.

Full text
Abstract:
In order for power system operators (such as TRANSCO) to maintain and operatethe transmission grid in a safe, secure and effcient way, automatic tools such asSCADA systems is necessary to meet demand at all times. The main purpose of thisthesis was to develop a software/prototype at the load despatch centre at TRANSCOwith the ability to monitor and communicate with power plants. The software issupposed to work in a real-time electronic market. The power plant operators candeclare their availability and capability parameters of their generating and producingunits to TRANSCO and LDC operators can send load despatch instructions to thepower plants (such as load changes and other ancillary instructions). The prototypealso has a compliance monitoring application that validates unit outputs againstdespatched instructions. If the output is outside a specific interval, a transgressionwarning is sent to the power plant informing them that they should adjust their unitoutput against the target load. If further transgression is continued, the operator atLDC can re-declare the units availability on the power plants behalf and issue a newload despatch instruction to the unit. The re-declared availability level will be valid allthe way back to when the unit issued the last availability declaration.The software was successfully developed and could perform all tasks that it wassupposed to in a satisfactory way. In order to make the development as sufficient andeffective as possible, a "dummy" power plant was created and was used to simulateunit outputs and plant operator behaviour. As the time was too short, the SCADAintegration was never investigated and was left to whom is taken over after this thesishas ended.
APA, Harvard, Vancouver, ISO, and other styles
3

Duisembiyeva, Akzharkyn. "Automated security analysis of a SCADA system." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-286336.

Full text
Abstract:
Supervisory control and data acquisition (SCADA) is a computer system for analysing, and monitoring data, as well as, controlling a plant in industries such as power grids, oil, gas refining, and water control. SCADA belongs to the category of critical systems that are needed to maintain the infrastructure of cities and households. Therefore, the security aspect of such a system has a significant role. The early SCADA systems were designed with the operation as the primary concern rather than security since they were a monolithic networked system without external access. However, the systems evolved, and SCADA systems were embedded with web technologies for users to monitor the data externally. These changes improved the efficiency of monitoring and productivity; however, this caused a problem of potential cyber-attacks to a SCADA system. One such example was Ukraine’s power grid blackout in 2015. Therefore, it is beneficial for the security of a SCADA system to create a threat modeling technique that can understand the critical components of SCADA, discover potential threats, and propose possible mitigation strategies. One issue when creating a threat model is the significant difference of SCADA from traditional Operational Technology (OT) systems. Another significant issue is that SCADA is a highly customisable system, and each SCADA instance can have different components. Therefore, for this work, we implemented a threat modeling language scadaLang, which is specific to the domain of a SCADA system. We started by defining the major assets of a SCADA system, attackers, entry surfaces, and built attacks and defense strategies. Then we developed a threat modeling domain-specific language scadaLang that can create a threat model for a particular instance of SCADA taking the differences in components and connections into account. As a result, we achieved a threat modeling language for SCADA, ensured the reliability of the results by peer-reviewing of an engineer familiar with the domain of the problem, and proposed a Turing test to ensure the validity of the result of scadaLang as the future development of the project.
Supervisory control and data acquisition (SCADA) är ett datorsystem för att analysera och monitorera data samt kontrollera anläggningar för industrier såsom energisystem, olja, raffinering av gas och vatten. SCADA tillhör den kategori av kritiska system som krävs för att bibehålla städer och hushålls infrastruktur. Därför är säkerhetsaspekten av ett sådant system av stor roll. De tidiga SCADA systemen var utformade med funktionen som huvudsaklig oro istället för säkerheten då de var monolitiska nätverkssystem utan extern åtkomst. Systemen utvecklades emellertid och SCADA systemen blev inbyggda med webbteknologier så att användare kan monitorera data externt. De här förändringarna förbättrade effektiviteten av monitorering och produktivitet men skapade problemet med potentiella cyber-attacker mot SCADA systemen. Ett sådant exempel är Ukrainas energy systems elavbrott som skedde 2015. Därför är det fördelaktigt för säkerheten av SCADA systemen att skapa en hotmodelleringsteknik för att bättre förstå de kritiska komponenterna av SCADA, hitta potentiella hot och föreslå potentiella förmildrande strategier. Ett problem för utvecklingen av en hotmodell är den stora skillnaden mellan SCADA från traditionella nätverkssystem inom industri. Ett annat stort problem är att SCADA är ett justerbart system och varje SCADA instans kan ha olika komponenter. Därför utvecklar vi i detta arbete ett språk för hotmodellering scadaLang som är specifikt för domänen SCADA system. Vi började med att definiera de huvudsakliga komponenterna av SCADA system, angriparna, attack ytorna och även bygga attacker samt försvarsstrategier. Sen utvecklade vi ett språk för hotmodelleringen som är domänspecifikt, scadaLang som kan skapa en hotmodell för en specifik instans av SCADA där skillnaderna på komponenter och sammankopplingar tas till hänsyn. Som resultat har vi skapat ett språk för hotmodellering för SCADA,verifierat resultat med hjälp av en ingenjör med domänkännedom och föreslagit ett Turing test för att förbättra verifieringen av resultatet som ett framtida arbete.
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Hao. "WINCC SCADA system via profibus & OPC." Thesis, Xu, Hao (2013) WINCC SCADA system via profibus & OPC. Other thesis, Murdoch University, 2013. https://researchrepository.murdoch.edu.au/id/eprint/21651/.

Full text
Abstract:
Over 1500 hours' effort were put into this intensive project with 6 weeks prior to the commencing date of the project to meet the objectives and requirements of the project. During this project, all the available devices, instruments including their configuration software were properly configured with all the expected features fully functioning. This thesis report summaries most of the work done with a reasonably detailed level to support future students with a comprehensive background to develop the project aspects in the future. A comprehensive SCADA system was designed and implemented using the configured devices and the control modules in the laboratory. The network structure of the control system was relatively large, but indeed demonstrated the capability of the automation system. Profibus communication networks in the laboratory were carefully designed and fully set up with proper labels, which would then be used as an education tool to gain the experience of industrial communication by the students. Over 500 pages of configuration manuals of devices and configuration software were created as a large part of the focus of this project. The configuration manuals contain a huge range of information which covers more than what students need during their study. Those manuals are expected to guide students for their projects and troubleshooting.
APA, Harvard, Vancouver, ISO, and other styles
5

Kabore, Raogo. "Hybrid deep neural network anomaly detection system for SCADA networks." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2020. http://www.theses.fr/2020IMTA0190.

Full text
Abstract:
Les systèmes SCADA sont de plus en plus ciblés par les cyberattaques en raison de nombreuses vulnérabilités dans le matériel, les logiciels, les protocoles et la pile de communication. Ces systèmes utilisent aujourd'hui du matériel, des logiciels, des systèmes d'exploitation et des protocoles standard. De plus, les systèmes SCADA qui étaient auparavant isolés sont désormais interconnectés aux réseaux d'entreprise et à Internet, élargissant ainsi la surface d'attaque. Dans cette thèse, nous utilisons une approche deep learning pour proposer un réseau de neurones profonds hybride efficace pour la détection d'anomalies dans les systèmes SCADA. Les principales caractéristiques des données SCADA sont apprises de manière automatique et non supervisée, puis transmises à un classificateur supervisé afin de déterminer si ces données sont normales ou anormales, c'est-à-dire s'il y a une cyber-attaque ou non. Par la suite, en réponse au défi dû au temps d’entraînement élevé des modèles deep learning, nous avons proposé une approche distribuée de notre système de détection d'anomalies afin de réduire le temps d’entraînement de notre modèle
SCADA systems are more and more targeted by cyber-attacks because of many vulnerabilities inhardware, software, protocols and the communication stack. Those systems nowadays use standard hardware, software, operating systems and protocols. Furthermore, SCADA systems which used to be air-gaped are now interconnected to corporate networks and to the Internet, widening the attack surface.In this thesis, we are using a deep learning approach to propose an efficient hybrid deep neural network for anomaly detection in SCADA systems. The salient features of SCADA data are automatically and unsupervisingly learnt, and then fed to a supervised classifier in order to dertermine if those data are normal or abnormal, i.e if there is a cyber-attack or not. Afterwards, as a response to the challenge caused by high training time of deep learning models, we proposed a distributed approach of our anomaly detection system in order lo lessen the training time of our model
APA, Harvard, Vancouver, ISO, and other styles
6

Khan, Ahsan Al Zaki. "Intrusion Detection System Design and Performance Evaluation for SCADA Networks." University of Toledo / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1575950415516331.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Farde, Andreas, and Carl Svinge. "SCADA-system för mindre företag - en inkörsport till Industri 4.0." Thesis, KTH, Hållbar produktionsutveckling (ML), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-255833.

Full text
Abstract:
Den digitala fabriken behöver inte kräva stora investeringar och fördelarna är stora för företag som vill öka sin konkurrenskraft. Med hjälp av den digitala fabriken kan man utveckla varje enskild process eller hela fabriken samt övervaka sin produktion med större precision. Syftet med detta arbete var hur en digitaliserad fabrik kan öka konkurrenskraften, vilka resurser som krävs för att digitalisera och vilka problem som kan uppstå när man digitaliserar. Arbetet har byggts på en specifik studie hos ett litet företag med en redan framtagen prototyp som vidareutvecklades och installerades i ett skapat nätverkssystem med syfte att meddela tillståndet fabriken eller tillverkningsmaskinerna befinner sig i. Studien har gått ut på att jämföra nyckeltal (KPI:er) som är mätta manuellt och automatiskt. De manuellt mätta nyckeltalen samlades in via en framtagen mall, och de automatiska mätta nyckeltalen samlades in via en prototyp som omfattade en RAPID SCADA implementation. Detta för att praktiskt få en uppfattning över vad skillnaden och fördelen är mellan att mäta nyckeltal manuellt eller mäta det automatiskt. KPI:erna som tas fram är baserade på OEE, men det lyfts även fram att utvecklingen till andra viktiga mätvärden kan tas fram från denna grund. Systemet som är framtaget är flexibelt nog för att kunna ses som ett enkelt verktyg att använda för att skräddarsy en lösning som passar hos varje enskild SME. Arbetet visar att digitalisering inte nödvändigtvis måste kräva stora investeringar eller hög kompetens. Det som kan vara bekymmersamt för ett mindre företag är däremot tiden som kan behövas läggas ner för att förstå varför och hur systemet ska byggas då personal kan vara en bristvara.
The digital industry does not need a huge investment and the advantages are many for companies that wants to gain competitiveness. With the implementation of a digital factory you can develop each process or the whole factory and at the same time monitor the production with greater precision. The reason for this study is how a digital factory can improve their competitiveness, what resources are necessary and which problems are likely to occur and how to solve them. The study has taken place at a specific small industry with an already established prototype that was further developed and installed in a created network system with purpose to communicate the status of the factory or each single machine. The study's main focus has been to compare manually taken key performance indicators through a form, and automatically taken key performance indicators from the digital system with the help of the prototype which included a RAPID SCADA implementation. This is for practical enlightenment over the difference between a manually and an automatic system and which one to prefer. The KPI:s are based on OEE, but it also highlight that the development to other measurement tools can easily be achieved from this base. The system that has beencreated are flexible and adaptable to be used as a tailor fit solution that most SME can use. The study shows that an implementation of a digital solution does not necessarily need huge means of investments or high personal competence. The worrying part from the perspective of a smaller company is the time it takes to learn why and how the system should be built.
APA, Harvard, Vancouver, ISO, and other styles
8

Yuxiang, Yang, Dang Xiaoyu, and Zhou Tingxian. "PROPOSAL OF POLLED-CSMA PROTOCOL FOR AN AD HOC SCADA SYSTEM." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/606484.

Full text
Abstract:
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California
In this paper we introduce an ad hoc distributed supervisory control and data acquisition (SCADA) system, which covers two types of traffic, a small number of slave stations with stream traffic and much larger number of slave stations with burst traffic. To improve the system’s real-time transmission and channel allocation efficiency, a MAC scheme, named Polled-CSMA, is designed by integrating the merits of polling and CSMA protocols. Extensive analysis shows that this MAC protocol meets the system’s QOS requirements.
APA, Harvard, Vancouver, ISO, and other styles
9

Aykac, Emel Sinem. "Development Of A Scada Control System For A Weighing And Bagging Machine." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12611857/index.pdf.

Full text
Abstract:
In this thesis study, a prototype is designed in order to improve the weighing accuracy of the weighing and packaging machine that used in sugar factories. The unavoidable factory conditions cause weighing and packaging machine to do weighing errors. In order to correct these errors, the prototype produced in this study was designed as a quality control unit which will take the excess sugar and fill the deficient sugar in the sacks. Because of being small and having an easy installation, the application of the prototype was done considering 1-kilogram bags rather than available 50-kilogram ones. So as to correct the faulty weighing, sugar extraction and filling processes are provided from a bunker which is designed on the basis of data obtained by statistical analysis. For suction, vacuum is used and filling is realized by a ball valve. Upwards and downwards movement of the bunker is carried out with a pneumatic cylinder. Weighing information is received via a load cell and an indicator. Control of all these devices is provided by PLC hardware and SCADA interface.
APA, Harvard, Vancouver, ISO, and other styles
10

Bragagni, Cristiano. "Progettazione di uno strumento di analisi dati per sistemi SCADA-ENERGY Management System." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7927/.

Full text
Abstract:
L’obiettivo di questa tesi è approfondire le competenze sulle funzionalità sviluppate nei sistemi SCADA/EMS presenti sul mercato, così da conoscerne le potenzialità offerte: tutte le conoscenze acquisite servono a progettare uno strumento di analisi dati flessibile e interattivo, con il quale è possibile svolgere analisi non proponibili con le altre soluzioni analizzate. La progettazione dello strumento di analisi dei dati è orientata a definire un modello multidimensionale per la rappresentazione delle informazioni: il percorso di progettazione richiede di individuare le informazioni d’interesse per l’utente, così da poterle reintrodurre in fase di progettazione della nuova base dati. L’infrastruttura finale di questa nuova funzionalità si concretizza in un data warehouse: tutte le informazioni di analisi sono memorizzare su una base dati diversa da quella di On.Energy, evitando di correlare le prestazione dei due diversi sottosistemi. L’utilizzo di un data warehouse pone le basi per realizzare analisi su lunghi periodi temporali: tutte le tipologie di interrogazione dati comprendono un enorme quantità d’informazioni, esattamente in linea con le caratteristiche delle interrogazioni OLAP
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "SCADA-system"

1

Colo.) USCID Water Management Conference (2007 Denver. SCADA and related technologies for irrigation system modernization, II: A USCID water management conference. Denver, CO: U.S. Committee on Irrigation and Drainage, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Services, CSR Market Data, and PennWell Publishing Company, eds. European water utility control systems market data report: Sales opportunities for SCADA and process control system. Tulsa, OK (P.O. Box 2053, Tulsa 74101-9863): PennWell Pub. Co., 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

IEEE Power Engineering Society. Substations Committee. and IEEE Standards Board, eds. IEEE recommended practice for master/remote supervisory control and data acquisition (SCADA) communications. New York: Institute of Electrical and Electronics Engineers, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

McDonald, John D., and Mini S. Thomas. Power System Scada and Smart Grids. Taylor & Francis Group, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thomas, Mini S., and John Douglas McDonald. Power System SCADA and Smart Grids. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Thomas, Mini S., and John Douglas McDonald. Power System SCADA and Smart Grids. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Power System SCADA and Smart Grids. Taylor & Francis Group, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scada Principles for Bottle Filling System. LAP Lambert Academic Publishing, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thomas, Mini S., and John Douglas McDonald. Power System SCADA and Smart Grids. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Thomas, Mini S., and John Douglas McDonald. Power System SCADA and Smart Grids. Taylor & Francis Group, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "SCADA-system"

1

Fovino, Igor Nai. "SCADA System Cyber Security." In Secure Smart Embedded Devices, Platforms and Applications, 451–71. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-7915-4_20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bazydło, Piotr, and Roman Szewczyk. "Integrated SCADA Checkweigher System." In Advances in Intelligent Systems and Computing, 11–20. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-15835-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kusiek, Arne. "Was ist ein SCADA-System?" In Windenergieanlagen, 239–43. München: Carl Hanser Verlag GmbH & Co. KG, 2022. http://dx.doi.org/10.3139/9783446472877.052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Enescu, Florentina Magda, and Nicu Bizon. "SCADA Applications for Electric Power System." In Power Systems, 561–609. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-51118-4_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ali, Saqib, Taiseera Al Balushi, Zia Nadir, and Omar Khadeer Hussain. "ICS/SCADA System Security for CPS." In Studies in Computational Intelligence, 89–113. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75880-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Xu, Honghua, Weili Shi, and Zhanfang Chen. "Wasterwater Factories Solution on SCADA System." In Advances in Computer Science, Intelligent System and Environment, 207–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-23756-0_34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Eden, Peter, Andrew Blyth, Kevin Jones, Hugh Soulsby, Pete Burnap, Yulia Cherdantseva, and Kristan Stoddart. "SCADA System Forensic Analysis Within IIoT." In Springer Series in Advanced Manufacturing, 73–101. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-50660-9_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Jinjing, Ling Pang, and Bai Lin. "SDNVD-SCADA: A Formalized Vulnerability Detection Platform in SDN-Enabled SCADA System." In Communications in Computer and Information Science, 3–15. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-8135-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Shbib, Reda, Shikun Zhou, and Khalil Alkadhimi. "SCADA System Security, Complexity, and Security Proof." In Pervasive Computing and the Networked World, 405–10. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37015-1_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fovino, Igor Nai, Marcelo Masera, Michele Guglielmi, Andrea Carcano, and Alberto Trombetta. "Distributed Intrusion Detection System for SCADA Protocols." In Critical Infrastructure Protection IV, 95–110. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16806-2_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "SCADA-system"

1

Al-tamimi, Aref. "Secured Scada System." In Qatar Foundation Annual Research Conference Proceedings. Hamad bin Khalifa University Press (HBKU Press), 2014. http://dx.doi.org/10.5339/qfarc.2014.itpp1036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Fall, Moustapha, Chris Chuvalas, Nolan Warning, Max Rabiee, and Carla Purdy. "Enhancing SCADA System Security." In 2020 IEEE 63rd International Midwest Symposium on Circuits and Systems (MWSCAS). IEEE, 2020. http://dx.doi.org/10.1109/mwscas48704.2020.9184532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kosakaya, Juichi. "Multi-agent-based SCADA system." In 2016 Second International Conference on Event-based Control, Communication, and Signal Processing (EBCCSP). IEEE, 2016. http://dx.doi.org/10.1109/ebccsp.2016.7605270.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chakole, M. egha, Simran Dongre, Abhijeet Motghare, Ankit Harale, Shraddha Sharma, and S. P. Mahajan. "ZIGBEE based Wireless SCADA System." In 2023 7th International Conference on Trends in Electronics and Informatics (ICOEI). IEEE, 2023. http://dx.doi.org/10.1109/icoei56765.2023.10125965.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yadav, Geeta, and Kolin Paul. "Assessment of SCADA System Vulnerabilities." In 2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2019. http://dx.doi.org/10.1109/etfa.2019.8869541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Кабанов, Петр, Peter Kabanov, Михаил Суходоев, and Mikhail Sukhodoev. "Creation of Geodistributed SCADA-System." In 29th International Conference on Computer Graphics, Image Processing and Computer Vision, Visualization Systems and the Virtual Environment GraphiCon'2019. Bryansk State Technical University, 2019. http://dx.doi.org/10.30987/graphicon-2019-1-149-151.

Full text
Abstract:
This article shows the possibility of combining modern software development technologies. SCADA systems usually do not use the full power of modern visualization technologies (rendering of three-dimensional objects, spatial transformation, etc.). In addition to graphics, users of these systems have a question about the possibility of using GIS systems to facilitate the determination of the location of objects (on global, local, and other maps). Using all the technologies described in this article, a system was developed that meets the basic requirements of the SCADA system. The developed system perfectly combines three-dimensional visualization and support of the GIS system. These implementations showed excellent results and feedback from users (with the test and final versions of the program).
APA, Harvard, Vancouver, ISO, and other styles
7

Wai-Leung Cheung, R. "Wireless access to SCADA system." In APSCOM 2000 - 5th International Conference on Advances in Power System Control, Operation and Management. IEE, 2000. http://dx.doi.org/10.1049/cp:20000461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yi, Mao, Harald Mueller, Liu Yu, and Jiang Chuan. "Benchmarking Cloud-Based SCADA System." In 2017 IEEE International Conference on Cloud Computing Technology and Science (CloudCom). IEEE, 2017. http://dx.doi.org/10.1109/cloudcom.2017.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Moshko, Stanislav V., and Anastasiia D. Stotckaia. "Principles of SCADA-system development." In 2018 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (EIConRus). IEEE, 2018. http://dx.doi.org/10.1109/eiconrus.2018.8317243.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tofani, Kemas M., P. A. Permana, B. B. S. D. A. Harsono, Dhandis R. Jintaka, and K. G. H. Mangunnkusumo. "SCADA System Implementation for Small System Electricity." In 2020 2nd International Conference on Industrial Electrical and Electronics (ICIEE). IEEE, 2020. http://dx.doi.org/10.1109/iciee49813.2020.9277497.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "SCADA-system"

1

Newquist, Dan. Demonstration of SCADA system to Manage Oilfield Pump Off Controllers. Office of Scientific and Technical Information (OSTI), September 2000. http://dx.doi.org/10.2172/833737.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Author, Not Given. Laboratory Cyber Security Assessment of the OSII SCADA Control System. Office of Scientific and Technical Information (OSTI), March 2010. http://dx.doi.org/10.2172/974248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Baily, Scott A., Dale Allen Dalmas, Robert Mitchell Wheat, Keith Albert Woloshun, and Gregory E. Dale. Multiple Flow Loop SCADA System Implemented on the Production Prototype Loop. Office of Scientific and Technical Information (OSTI), November 2015. http://dx.doi.org/10.2172/1226139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

ZAKRAJSEK, M. F. Supervisory Control and Data Acquisition System (SCADA) Substation C3S4 Acceptance Test Procedure. Office of Scientific and Technical Information (OSTI), October 2000. http://dx.doi.org/10.2172/805369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lee, Erik J., John M. Michalski, and Brian P. Van Leeuwen. National SCADA Test Bed: FY05 Progress on Virtual Control System Environment (VCSE). Office of Scientific and Technical Information (OSTI), July 2006. http://dx.doi.org/10.2172/1323931.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Carrol. PR-214-05502-R01 Application of Fatigue Analysis Procedures Using Pipeline SCADA Data. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), February 2007. http://dx.doi.org/10.55274/r0011248.

Full text
Abstract:
Fatigue life prediction for in-service pipelines can vary considerably, with one of the prime sources of variability being the pipeline operating pressure data typically captured and archived using a Supervisor Control and Data Acquisition (SCADA) system. SCADA systems may operate differently from one system to another and the records can be significantly different on the basis of the operational parameter sampling technique. Operating pressure data is a key input into integrity analysis for pipelines containing defects. BMT Fleet has collected close to 200 pressure data sets and has been investigating the sensitivity of fatigue life predictions for a number of pipeline operators for weld defects, dents, wrinkles, etc. on an individual basis. A strong understanding of the variability of the results has been obtained, but not formally presented in a comprehensive guidance document.The goal of the present investigation is to determine the impact of various precedures used to collect SCADA data on the resulting fatigue life predictions for defects. Based upon the analysis conducted, recommendations will be provided to outline techniques that should be applied to collecting SCADA data and for the subsequent use in integrity analysis processes. Procedures will be discussed to ensure that fatigue assessments based upon SCADA data are acceptably accurate, reliable and reproducible.
APA, Harvard, Vancouver, ISO, and other styles
7

ZAKRAJSEK, M. F. Supervisory Control and Data Acquisition System (SCADA) Substation C3-3 Acceptance Test Procedure. Office of Scientific and Technical Information (OSTI), October 2000. http://dx.doi.org/10.2172/805368.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Taylor, Trent. Final CRADA Report: Siemens-INL SCADA System Assessments: Assessment 1: Spectrum Power TG Assessment 2: Spectrum Power 3. Office of Scientific and Technical Information (OSTI), October 2013. http://dx.doi.org/10.2172/1096993.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tzonev, Nick. PR-396-183905-R01 Autonomous System For Monitoring Pipeline River Crossings. Chantilly, Virginia: Pipeline Research Council International, Inc. (PRCI), June 2021. http://dx.doi.org/10.55274/r0012110.

Full text
Abstract:
The goal of the GHZ-2-01 Project is to develop and lab-test a system for monitoring underground pipeline facilities at remote river crossings where access to power and wireline communications is not readily available. A next generation real-time river crossing monitoring solution requires an integration of various sensor types, data computation capabilities, and low power wireless connectivity which would: - utilize proven sensors technologies such as accelerometers, inclinometer strings and float-out buoys to detect dangerous conditions, - be able to recognize and minimize false alarms by examining a combination of sensors, - alarm on contact with hydrocarbons, - require minimal maintenance, - be easily scalable, both geographically and as a network, - provide seamless integration into Supervisory Control and Acquisition (SCADA) systems, and - be economical. There is a related webinar.
APA, Harvard, Vancouver, ISO, and other styles
10

Stouffer, Keith, Joe Falco, and Karen Scarfone. Guide to Industrial Control Systems (ICS) Security : Supervisory Control and Data Acquisition (SCADA) Systems, Distributed Control Systems (DCS), and Other Control System Configurations such as Programmable Logic Controllers (PLC). National Institute of Standards and Technology, May 2013. http://dx.doi.org/10.6028/nist.sp.800-82r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography