Artículos de revistas sobre el tema "IEC 60870-5-104"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 29 mejores artículos de revistas para su investigación sobre el tema "IEC 60870-5-104".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.
Texto completoHareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.
Texto completoHan, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.
Texto completoMaulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.
Texto completoCsatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.
Texto completoQassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.
Texto completoQassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.
Texto completoDurak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.
Texto completoFeria Briceño, John Henry. "Diseño e implementación de un algoritmo para translación de protocolo entre las normas IEC60870-5-104 y MODBUS TCP/IP." Ingenium Revista de la facultad de ingeniería 16, no. 32 (2015): 102. http://dx.doi.org/10.21500/01247492.1674.
Texto completoArifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Texto completoShi, Shan, Yong Wang, Cunming Zou, and Yingjie Tian. "AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol." Journal of Computer and Communications 10, no. 01 (2022): 27–41. http://dx.doi.org/10.4236/jcc.2022.101002.
Texto completoNadeem, Furquan, Mohd Asim Aftab, S. M. Suhail Hussain, et al. "Virtual Power Plant Management in Smart Grids with XMPP Based IEC 61850 Communication." Energies 12, no. 12 (2019): 2398. http://dx.doi.org/10.3390/en12122398.
Texto completoTao, Weiqing, Mengyu Ma, Ming Ding, Wei Xie, and Chen Fang. "A Priority-Based Synchronous Phasor Transmission Protocol Extension Method for the Active Distribution Network." Applied Sciences 9, no. 10 (2019): 2135. http://dx.doi.org/10.3390/app9102135.
Texto completoJarmakiewicz, Jacek, Krzysztof Maślank, and Krzysztof Parobczak. "Evaluation of the Cyber Security Provision System for Critical Infrastructure." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 22–29. http://dx.doi.org/10.26636/jtit.2015.4.980.
Texto completoSyamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.
Texto completoShih, Yusi. "Measured wind data in digital: Develop and optimize offshore wind farm SCADA by IEC 60870-5-104 protocol and DMZ." Energy Reports 8 (April 2022): 1231–42. http://dx.doi.org/10.1016/j.egyr.2021.11.182.
Texto completoAkbarzadeh, Aida, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt, and Hans Kristian Muggerud. "Attacking IEC 61850 Substations by Targeting the PTP Protocol." Electronics 12, no. 12 (2023): 2596. http://dx.doi.org/10.3390/electronics12122596.
Texto completoYang, Chao, Deji Chen, and Hongyuan Hu. "IEC104 protocol-based substation data upload IoT cloud platform implementation." Journal of Physics: Conference Series 2874, no. 1 (2024): 012006. http://dx.doi.org/10.1088/1742-6596/2874/1/012006.
Texto completoHarrou, Fouzi, Benamar Bouyeddou, Abdelkader Dairi, and Ying Sun. "Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids." Future Internet 16, no. 6 (2024): 184. http://dx.doi.org/10.3390/fi16060184.
Texto completoVrdoljak, K., B. Kopić, M. Gec, J. Krstulović Opara, and S. Sekulić. "Automatic Generation Control Application for Transmission and Generation Centres." Journal of Energy - Energija 67, no. 2 (2022): 23–32. http://dx.doi.org/10.37798/201867277.
Texto completoTao, Weiqing, Xiong Chen, and Qiaoyun Zhang. "Realization of IEC 60870-5-104 Protocol in DTU." International Journal of Computer and Electrical Engineering, 2010, 815–20. http://dx.doi.org/10.7763/ijcee.2010.v2.233.
Texto completoEgger, Michael, Günther Eibl, and Dominik Engel. "Comparison of approaches for intrusion detection in substations using the IEC 60870-5-104 protocol." Energy Informatics 3, S1 (2020). http://dx.doi.org/10.1186/s42162-020-00118-4.
Texto completoBaltuille Puente, Pablo, Antonio Morán, Serafin Alonso, Miguel Ángel Prada, Juan José Fuertes, and Manuel Domínguez. "Demostrador para el análisis de tráfico de red en subestaciones de tracción basadas en IEC61850." Jornadas de Automática, no. 45 (July 19, 2024). http://dx.doi.org/10.17979/ja-cea.2024.45.10920.
Texto completoArifin, M. Agus Syamsul, Deris Stiawan, Bhakti Yudho Suprapto, et al. "Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104." IET Cyber-Physical Systems: Theory & Applications, January 4, 2024. http://dx.doi.org/10.1049/cps2.12085.
Texto completoTeryak, Hadir, Abdullatif Albaseer, Mohamed Abdallah, Saif Al-kuwari, and Marwa Qaraqe. "Double-Edged Defense: Thwarting Cyber Attacks and Adversarial Machine Learning in IEC 60870-5-104 Smart Grids." IEEE Open Journal of the Industrial Electronics Society, 2023, 1–14. http://dx.doi.org/10.1109/ojies.2023.3336234.
Texto completoAgus Syamsul Arifin, M., Deris Stiawan, Bhakti Yudho Suprapto, et al. "A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard." IEEE Access, 2024, 1. http://dx.doi.org/10.1109/access.2024.3473895.
Texto completoRadoglou-Grammatikis, Panagiotis, Konstantinos Rompolos, Panagiotis Sarigiannidis, et al. "Modelling, Detecting and Mitigating Threats Against Industrial Healthcare Systems: A combined SDN and Reinforcement Learning Approach." July 1, 2021. https://doi.org/10.1109/TII.2021.3093905.
Texto completoAkbarzadeh, Aida, Laszlo Erdodi, Siv Hilde Houmb, and Tore Geir Soltvedt. "Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation." International Journal of Information Security, May 14, 2024. http://dx.doi.org/10.1007/s10207-024-00856-6.
Texto completoCiaramella, Giovanni, Fabio Martinelli, Antonella Santone, and Francesco Mercaldo. "A method for smart grid intrusion detection through explainable deep learning." Journal of Computer Virology and Hacking Techniques 21, no. 1 (2025). https://doi.org/10.1007/s11416-025-00549-1.
Texto completo