Literatura académica sobre el tema "IEC 60870-5-104"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "IEC 60870-5-104".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "IEC 60870-5-104"
Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.
Texto completoHareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.
Texto completoHan, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.
Texto completoMaulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.
Texto completoCsatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.
Texto completoQassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.
Texto completoQassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.
Texto completoDurak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.
Texto completoFeria Briceño, John Henry. "Diseño e implementación de un algoritmo para translación de protocolo entre las normas IEC60870-5-104 y MODBUS TCP/IP." Ingenium Revista de la facultad de ingeniería 16, no. 32 (2015): 102. http://dx.doi.org/10.21500/01247492.1674.
Texto completoArifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Texto completoTesis sobre el tema "IEC 60870-5-104"
Pekárek, Dominik. "Popis a testování komunikačních protokolů normy IEC 60870-5-103 a 60870-5-104." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-319300.
Texto completoKrejčír, Ľuboš. "Inteligentní systémy hromadného sběru dat v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-219336.
Texto completoAndersson, Dorothea. "Simulation of industrial control system field devices for cyber security." Thesis, KTH, Elkraftteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-202405.
Texto completoFundin, August. "Generating Datasets Through the Introduction of an Attack Agent in a SCADA Testbed : A methodology of creating datasets for intrusion detection research in a SCADA system using IEC-60870-5-104." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-175911.
Texto completoSobotka, Lukáš. "Analýza protokolů pro komunikaci v energetických sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399184.
Texto completoBeneš, Pavel. "Simulace komunikační části moderních průmyslových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413041.
Texto completoHošták, Viliam Samuel. "Učení se automatů pro rychlou detekci anomálií v síťovém provozu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-449296.
Texto completoJančová, Markéta. "Generická analýza toků v počítačových sítích." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-417290.
Texto completoCHIU, YEN-MING, and 邱彥銘. "Implementation and Design of IEC 60870-5-104 and ARPv4 Fuzz Testing." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/92ukj4.
Texto completoYeh, Yu-Kuan, and 葉禹寬. "Intrusion Detection Method for IEC 60870-5-104 Protocol Using Honeypot Logs." Thesis, 2019. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22107NCHU5394024%22.&searchmode=basic.
Texto completoCapítulos de libros sobre el tema "IEC 60870-5-104"
Holik, Filip, Doney Abraham, and Sule Yildirim Yayilgan. "Emulation of IEC 60870-5-104 Communication in Digital Secondary Substations." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-10525-8_19.
Texto completoNguyen, Duc Duong, Manh Hung Do, Ngoc Thanh Pham, Van Dung Ngo, and Viet Phuong Pham. "Design Smart Factory Using RTDS and 800xA SCADA Based on IEC 60870-5-104." In Lecture Notes in Networks and Systems. Springer Nature Switzerland, 2025. https://doi.org/10.1007/978-3-031-90606-0_30.
Texto completoActas de conferencias sobre el tema "IEC 60870-5-104"
He, Bangwei, Feng Wang, Jianxiu Li, et al. "Cyber Risk Detection for IEC 60870-5-104 Operation Commands in Distribution Systems." In 2025 2nd International Conference on Smart Grid and Artificial Intelligence (SGAI). IEEE, 2025. https://doi.org/10.1109/sgai64825.2025.11009438.
Texto completoRadoglou-Grammatikis, Panagiotis, Panagiotis Sarigiannidis, Ioannis Giannoulakis, Emmanouil Kafetzakis, and Emmanouil Panaousis. "Attacking IEC-60870-5-104 SCADA Systems." In 2019 IEEE World Congress on Services (SERVICES). IEEE, 2019. http://dx.doi.org/10.1109/services.2019.00022.
Texto completoIlgner, Petr, and Radek Fujdiak. "Fuzzing Framework for IEC 60870-5-104 Protocol." In CSSE 2022: 2022 5th International Conference on Computer Science and Software Engineering. ACM, 2022. http://dx.doi.org/10.1145/3569966.3570026.
Texto completoGrammatikis, Panagiotis Radoglou, Panagiotis Sarigiannidis, Antonios Sarigiannidis, Dimitrios Margounakis, Apostolos Tsiakalos, and Georgios Efstathopoulos. "An Anomaly Detection Mechanism for IEC 60870-5-104." In 2020 9th International Conference on Modern Circuits and Systems Technologies (MOCAST). IEEE, 2020. http://dx.doi.org/10.1109/mocast49295.2020.9200285.
Texto completoHodo, Ersi, Stepan Grebeniuk, Henri Ruotsalainen, and Paul Tavolato. "Anomaly Detection for Simulated IEC-60870-5-104 Trafiic." In ARES '17: International Conference on Availability, Reliability and Security. ACM, 2017. http://dx.doi.org/10.1145/3098954.3103166.
Texto completoBaiocco, Alessio, and Stephen D. Wolthusen. "Indirect Synchronisation Vulnerabilities in the IEC 60870-5-104 Standard." In 2018 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT-Europe). IEEE, 2018. http://dx.doi.org/10.1109/isgteurope.2018.8571604.
Texto completoLin, Chih-Yuan, and Simin Nadjm-Tehrani. "Understanding IEC-60870-5-104 Traffic Patterns in SCADA Networks." In ASIA CCS '18: ACM Asia Conference on Computer and Communications Security. ACM, 2018. http://dx.doi.org/10.1145/3198458.3198460.
Texto completoYang, Y., K. McLaughlin, S. Sezer, Y. B. Yuan, and W. Huang. "Stateful intrusion detection for IEC 60870-5-104 SCADA security." In 2014 IEEE Power & Energy Society General Meeting. IEEE, 2014. http://dx.doi.org/10.1109/pesgm.2014.6939218.
Texto completoGrigoriou, Elisavet, Athanasios Liatifis, Panagiotis Radoglou Grammatikis, et al. "Protecting IEC 60870-5-104 ICS/SCADA Systems with Honeypots." In 2022 IEEE International Conference on Cyber Security and Resilience (CSR). IEEE, 2022. http://dx.doi.org/10.1109/csr54599.2022.9850329.
Texto completoCindrić, Ivan, and Tamara Hadjina. "An Analysis of IEC 62351 Implementations for Securing IEC 60870-5-104 Communication." In 2023 IEEE Belgrade PowerTech. IEEE, 2023. http://dx.doi.org/10.1109/powertech55446.2023.10202923.
Texto completo