Siga este enlace para ver otros tipos de publicaciones sobre el tema: IEC 60870-5-104.

Artículos de revistas sobre el tema "IEC 60870-5-104"

Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros

Elija tipo de fuente:

Consulte los 29 mejores artículos de revistas para su investigación sobre el tema "IEC 60870-5-104".

Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.

También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.

Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.

1

Saif Qassim, Qais, Norziana Jamil, Maslina Daud, et al. "Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system." International Journal of Engineering & Technology 7, no. 2.14 (2018): 153. http://dx.doi.org/10.14419/ijet.v7i2.14.12816.

Texto completo
Resumen
IEC 60870-5-104 is an international standard used for tele-control in electrical engineering and power system applications. It is one of the major principal protocols in SCADA system. Major industrial control vendors use this protocol for monitoring and managing power utility devices. One of the most common attacks which has a catastrophic impact on industrial control systems is the control command injection attack. It happens when an attacker injects false control commands into a control system. This paper presents the IEC 60870-5-104 vulnera-bilities from the perspective of command and infor
Los estilos APA, Harvard, Vancouver, ISO, etc.
2

Hareesh, Reddi, Rajesh Kalluri, Lagineni Mahendra, R. K. Senthil Kumar, and B. S. Bindhumadhava. "Passive Security Monitoring for IEC-60870-5-104 based SCADA Systems." International Journal of Industrial Control Systems Security 3, no. 1 (2020): 90–99. http://dx.doi.org/10.20533/ijicss.9781.9083.20346.2020.0010.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
3

Han, Guozheng, Bingyin Xu, and Jiale Suonan. "IEC 61850-Based Feeder Terminal Unit Modeling and Mapping to IEC 60870-5-104." IEEE Transactions on Power Delivery 27, no. 4 (2012): 2046–53. http://dx.doi.org/10.1109/tpwrd.2012.2209685.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
4

Maulana, Agus Harya. "Mengintegrasikan Adaptive Defense Scheme Ke Master Station Scada Pada Sistem Tenaga Listrik Jawa-Bali." PETIR 14, no. 1 (2020): 114–21. http://dx.doi.org/10.33322/petir.v14i1.935.

Texto completo
Resumen
Abstract
 The success of SCADA and Defense Scheme system will take effect the operation of electric power system. However the two systems were stand alone in Java-Bali power system due to different development time and platform. At present in Java-Bali a modern Defense Scheme system is being built, that is called Adaptive Defense Scheme (ADS). ADS system has capability to communicate data between IEDs or relay, and between IEDs with ADS server. ADS server has also communication protocol such as IEC 60870-5-104. In a previous study it was found that the integration between two different sy
Los estilos APA, Harvard, Vancouver, ISO, etc.
5

Csatár, János, Péter György, and Tamás Holczer. "Holistic attack methods against power systems using the IEC 60870-5-104 protocol." Infocommunications journal 15, no. 3 (2023): 42–53. http://dx.doi.org/10.36244/icj.2023.3.5.

Texto completo
Resumen
IEC 60870-5-104 is a widely used protocol for telecontrol in European power systems. However, security was not a design goal when it was originally published: This protocol lacks built-in security features such as encryption, integrity protection, or authentication. In this paper, we describe novel types of attacks against the protocol in a holistic way. Therefore, we also enumerate the possible entry points of the threat actors and demonstrate a new technique, where the malicious actor can precisely target the attack. These methods are demonstrated both on simulated environment and actual dev
Los estilos APA, Harvard, Vancouver, ISO, etc.
6

Qassim, Qais Saif, Muhammad Reza Z'aba, Wan Azlan Wan Kamarulzaman, and Norziana Jamil. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.10029063.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
7

Qassim, Qais Saif, Norziana Jamil, Muhammad Reza Z', N. A. aba, and Wan Azlan Wan Kamarulzaman. "Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system." International Journal of Critical Infrastructures 16, no. 2 (2020): 91. http://dx.doi.org/10.1504/ijcis.2020.107242.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
8

Durak, Onur, and Burak Tahincioglu. "Automated testing methodologies for substation automation systems (SAS) with IEC 61850 and IEC 60870-5-104 communication protocols." IET Conference Proceedings 2025, no. 5 (2025): 183–88. https://doi.org/10.1049/icp.2025.1067.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
9

Feria Briceño, John Henry. "Diseño e implementación de un algoritmo para translación de protocolo entre las normas IEC60870-5-104 y MODBUS TCP/IP." Ingenium Revista de la facultad de ingeniería 16, no. 32 (2015): 102. http://dx.doi.org/10.21500/01247492.1674.

Texto completo
Resumen
<p style="margin: 0cm 0cm 0pt; text-align: justify; line-height: 150%;"><span style="color: black; line-height: 150%; font-family: 'Arial','sans-serif'; font-size: 12pt; mso-bidi-font-weight: bold;">Este artículo muestra los resultados del proceso de diseño, implementación y prueba de un algoritmo para hacer la translación de protocolo entre las normas IEC 60870-5-104 y MODBUS TCP/IP, éste modelo de algoritmos son de amplio uso en los procesos de supervisión y automatización en sub-estaciones eléctricas.</span></p>
Los estilos APA, Harvard, Vancouver, ISO, etc.
10

Arifin, M. Agus Syamsul, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874–83. https://doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Texto completo
Resumen
Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough literature r
Los estilos APA, Harvard, Vancouver, ISO, etc.
11

Shi, Shan, Yong Wang, Cunming Zou, and Yingjie Tian. "AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol." Journal of Computer and Communications 10, no. 01 (2022): 27–41. http://dx.doi.org/10.4236/jcc.2022.101002.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
12

Nadeem, Furquan, Mohd Asim Aftab, S. M. Suhail Hussain, et al. "Virtual Power Plant Management in Smart Grids with XMPP Based IEC 61850 Communication." Energies 12, no. 12 (2019): 2398. http://dx.doi.org/10.3390/en12122398.

Texto completo
Resumen
Communication plays a key role in the effective management of virtual power plants (VPPs). For effective and stable operation of VPPs, a reliable, secure, and standardized communication infrastructure is required. In the literature, efforts were made to develop this based on industry standards, such as the IEC 60870-5-104, OpenADR 2.0b and IEC 61850. Due to its global acceptance and strong object-oriented information models, IEC 61850 standard-based communication is preferred for smart grid operations, including VPPs. However, communication models based on IEC 61850 present cybersecurity and s
Los estilos APA, Harvard, Vancouver, ISO, etc.
13

Tao, Weiqing, Mengyu Ma, Ming Ding, Wei Xie, and Chen Fang. "A Priority-Based Synchronous Phasor Transmission Protocol Extension Method for the Active Distribution Network." Applied Sciences 9, no. 10 (2019): 2135. http://dx.doi.org/10.3390/app9102135.

Texto completo
Resumen
With the advancement of active distribution network construction, to solve the shortcomings of the existing distribution network technology in distribution network perception and control, the relevant technologies of the Wide Area Measurement System (WAMS) in the transmission network have attracted more attention in terms of their usage in the distribution network. Micro Multifunction Phasor Measurement Unit (μMPMU), as an example, is being gradually utilized in the distribution network. However, the existing synchronous phasor transmission protocol is mainly designed for the transmission netw
Los estilos APA, Harvard, Vancouver, ISO, etc.
14

Jarmakiewicz, Jacek, Krzysztof Maślank, and Krzysztof Parobczak. "Evaluation of the Cyber Security Provision System for Critical Infrastructure." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2015): 22–29. http://dx.doi.org/10.26636/jtit.2015.4.980.

Texto completo
Resumen
The paper presents an assessment of the functional mechanisms that are part of the security system for the power grid control. The security system, its components, and the real time processes for the control of electricity supply were defined. In particular, SCADA protocols used in the control system and mechanisms for transferring them between the control center and actuators were identified. The paper also includes presentation of a test environment that is used for developed security mechanisms evaluation. In the last fragment of the paper, the test scenarios were formulated and the results
Los estilos APA, Harvard, Vancouver, ISO, etc.
15

Syamsul Arifin, M. Agus, Susanto Susanto, Deris Stiawan, Mohd Yazid Idris, and Rahmat Budiarto. "The trends of supervisory control and data acquisition security challenges in heterogeneous networks." Indonesian Journal of Electrical Engineering and Computer Science 22, no. 2 (2021): 874. http://dx.doi.org/10.11591/ijeecs.v22.i2.pp874-883.

Texto completo
Resumen
<p>Supervisory control and data acquisition (SCADA) has an important role in communication between devices in strategic industries such as power plant grid/network. Besides, the SCADA system is now open to any external heterogeneous networks to facilitate monitoring of industrial equipment, but this causes a new vulnerability in the SCADA network system. Any disruption on the SCADA system will give rise to a dangerous impact on industrial devices. Therefore, deep research and development of reliable intrusion detection system (IDS) for SCADA system/network is required. Via a thorough lit
Los estilos APA, Harvard, Vancouver, ISO, etc.
16

Shih, Yusi. "Measured wind data in digital: Develop and optimize offshore wind farm SCADA by IEC 60870-5-104 protocol and DMZ." Energy Reports 8 (April 2022): 1231–42. http://dx.doi.org/10.1016/j.egyr.2021.11.182.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
17

Akbarzadeh, Aida, Laszlo Erdodi, Siv Hilde Houmb, Tore Geir Soltvedt, and Hans Kristian Muggerud. "Attacking IEC 61850 Substations by Targeting the PTP Protocol." Electronics 12, no. 12 (2023): 2596. http://dx.doi.org/10.3390/electronics12122596.

Texto completo
Resumen
Digital substations, also referred to as modern power grid substations, utilize the IEC 61850 station and process bus in conjunction with IP-based communication. This includes communication with switch yard equipment within the substation as well as the dispatch center. IEC 61850 is a global standard developed to standardize power grid communications, covering multiple communication needs related to modern power grid substations or digital substations. Unlike the legacy communication standards, IEC 60870-5-104 and DNP3, IEC 61850 is specifically designed for IP-based communication. It comprise
Los estilos APA, Harvard, Vancouver, ISO, etc.
18

Yang, Chao, Deji Chen, and Hongyuan Hu. "IEC104 protocol-based substation data upload IoT cloud platform implementation." Journal of Physics: Conference Series 2874, no. 1 (2024): 012006. http://dx.doi.org/10.1088/1742-6596/2874/1/012006.

Texto completo
Resumen
Abstract The Industrial Internet of Things (IoT) has been developing rapidly under the background of Internet technology, and the most crucial part of its realization is the unified collection and access of heterogeneous data from multiple sources across networks and regions. For the access of substation system data, this paper designs a scheme to read data from IEC 60870-5-104 protocol and upload the data to IOT cloud platform by converting the data to data format supported by Kafka protocol, solving the problem of incompatibility between communication protocols, obtaining data from 104 secon
Los estilos APA, Harvard, Vancouver, ISO, etc.
19

Harrou, Fouzi, Benamar Bouyeddou, Abdelkader Dairi, and Ying Sun. "Exploiting Autoencoder-Based Anomaly Detection to Enhance Cybersecurity in Power Grids." Future Internet 16, no. 6 (2024): 184. http://dx.doi.org/10.3390/fi16060184.

Texto completo
Resumen
The evolution of smart grids has led to technological advances and a demand for more efficient and sustainable energy systems. However, the deployment of communication systems in smart grids has increased the threat of cyberattacks, which can result in power outages and disruptions. This paper presents a semi-supervised hybrid deep learning model that combines a Gated Recurrent Unit (GRU)-based Stacked Autoencoder (AE-GRU) with anomaly detection algorithms, including Isolation Forest, Local Outlier Factor, One-Class SVM, and Elliptical Envelope. Using GRU units in both the encoder and decoder
Los estilos APA, Harvard, Vancouver, ISO, etc.
20

Vrdoljak, K., B. Kopić, M. Gec, J. Krstulović Opara, and S. Sekulić. "Automatic Generation Control Application for Transmission and Generation Centres." Journal of Energy - Energija 67, no. 2 (2022): 23–32. http://dx.doi.org/10.37798/201867277.

Texto completo
Resumen
Recently, a new Emergency Control Centre for Albanian Transmission System Operator (TSO), which includes Supervisory control and data acquisition (SCADA) and Automatic Generation Control (AGC) applications, has been commissioned. Nowadays, an AGC application is being prepared for the biggest generation company in Croatia, as part of control centre for hydropower plants within western part of Croatia. Both of these implementations use the same AGC application, which is presented in this paper. Although AGC for TSO and AGC for Generation Centre (GC) have many similarities, their main goals are d
Los estilos APA, Harvard, Vancouver, ISO, etc.
21

Tao, Weiqing, Xiong Chen, and Qiaoyun Zhang. "Realization of IEC 60870-5-104 Protocol in DTU." International Journal of Computer and Electrical Engineering, 2010, 815–20. http://dx.doi.org/10.7763/ijcee.2010.v2.233.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
22

Egger, Michael, Günther Eibl, and Dominik Engel. "Comparison of approaches for intrusion detection in substations using the IEC 60870-5-104 protocol." Energy Informatics 3, S1 (2020). http://dx.doi.org/10.1186/s42162-020-00118-4.

Texto completo
Resumen
Abstract Electrical networks of transmission system operators are mostly built up as isolated networks without access to the Internet. With the increasing popularity of smart grids, securing the communication network has become more important to avoid cyber-attacks that could result in possible power outages. For misuse detection, signature-based approaches are already in use and special rules for a wide range of protocols have been developed. However, one big disadvantage of signature-based intrusion detection is that zero-day exploits cannot be detected. Machine-learning-based anomaly detect
Los estilos APA, Harvard, Vancouver, ISO, etc.
23

Baltuille Puente, Pablo, Antonio Morán, Serafin Alonso, Miguel Ángel Prada, Juan José Fuertes, and Manuel Domínguez. "Demostrador para el análisis de tráfico de red en subestaciones de tracción basadas en IEC61850." Jornadas de Automática, no. 45 (July 19, 2024). http://dx.doi.org/10.17979/ja-cea.2024.45.10920.

Texto completo
Resumen
En este artículo se presenta un procedimiento para analizar tráfico de red en subestaciones de tracción ferroviaria basadas en el estándar IEC 61850. Se propone el uso de un conjunto de sondas que detectan los eventos generados por los diferentes dispositivos de la red (relés de protección, unidad de control de subestación, sistema SCADA, etc.), junto con la metodología a seguir para la generación y el análisis de los paquetes de red. Además, se realiza un experimento sobre un armario de control que replica la estructura de automatización de una subestación de tracción. En este sistema se gene
Los estilos APA, Harvard, Vancouver, ISO, etc.
24

Arifin, M. Agus Syamsul, Deris Stiawan, Bhakti Yudho Suprapto, et al. "Oversampling and undersampling for intrusion detection system in the supervisory control and data acquisition IEC 60870‐5‐104." IET Cyber-Physical Systems: Theory & Applications, January 4, 2024. http://dx.doi.org/10.1049/cps2.12085.

Texto completo
Resumen
AbstractSupervisory control and data acquisition systems are critical in Industry 4.0 for controlling and monitoring industrial processes. However, these systems are vulnerable to various attacks, and therefore, intelligent and robust intrusion detection systems as security tools are necessary for ensuring security. Machine learning‐based intrusion detection systems require datasets with balanced class distribution, but in practice, imbalanced class distribution is unavoidable. A dataset created by running a supervisory control and data acquisition IEC 60870‐5‐104 (IEC 104) protocol on a testb
Los estilos APA, Harvard, Vancouver, ISO, etc.
25

Teryak, Hadir, Abdullatif Albaseer, Mohamed Abdallah, Saif Al-kuwari, and Marwa Qaraqe. "Double-Edged Defense: Thwarting Cyber Attacks and Adversarial Machine Learning in IEC 60870-5-104 Smart Grids." IEEE Open Journal of the Industrial Electronics Society, 2023, 1–14. http://dx.doi.org/10.1109/ojies.2023.3336234.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
26

Agus Syamsul Arifin, M., Deris Stiawan, Bhakti Yudho Suprapto, et al. "A Novel Dataset for Experimentation with Intrusion Detection Systems in SCADA Networks using IEC 60870-5-104 Standard." IEEE Access, 2024, 1. http://dx.doi.org/10.1109/access.2024.3473895.

Texto completo
Los estilos APA, Harvard, Vancouver, ISO, etc.
27

Radoglou-Grammatikis, Panagiotis, Konstantinos Rompolos, Panagiotis Sarigiannidis, et al. "Modelling, Detecting and Mitigating Threats Against Industrial Healthcare Systems: A combined SDN and Reinforcement Learning Approach." July 1, 2021. https://doi.org/10.1109/TII.2021.3093905.

Texto completo
Resumen
The rise of the Internet of Medical Things introduces the healthcare ecosystem in a new digital era with multiple benefits, such as remote medical assistance, real-time monitoring, and pervasive control. However, despite the valuable healthcare services, this progression raises significant cybersecurity and privacy concerns. In this article, we focus our attention on the IEC 60 870-5-104 protocol, which is widely adopted in industrial healthcare systems. First, we investigate and assess the severity of the IEC 60 870-5-104 cyberattacks by providing a quantitative threat model, which
Los estilos APA, Harvard, Vancouver, ISO, etc.
28

Akbarzadeh, Aida, Laszlo Erdodi, Siv Hilde Houmb, and Tore Geir Soltvedt. "Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation." International Journal of Information Security, May 14, 2024. http://dx.doi.org/10.1007/s10207-024-00856-6.

Texto completo
Resumen
AbstractAdvanced Persistent Threats (APTs) are stealthy, multi-step attacks tailored to a specific target. Often described as ’low and slow’, APTs remain undetected until the consequences of the cyber-attack become evident, usually in the form of damage to the physical world, as seen with the Stuxnet attack, or manipulation of an industrial process, as was the case in the Ukraine Power Grid attacks. Given the increasing sophistication and targeted nature of cyber-attacks, especially APTs, this paper delves into the substantial threats APTs pose to critical infrastructures, focusing on power gr
Los estilos APA, Harvard, Vancouver, ISO, etc.
29

Ciaramella, Giovanni, Fabio Martinelli, Antonella Santone, and Francesco Mercaldo. "A method for smart grid intrusion detection through explainable deep learning." Journal of Computer Virology and Hacking Techniques 21, no. 1 (2025). https://doi.org/10.1007/s11416-025-00549-1.

Texto completo
Resumen
Abstract Over the years, cyber-attacks have increased drastically, and their execution changed with time. One of the targets of cyber criminals is trying to obtain sensitive information from mobile, cloud, or generally IoT devices. To avoid those risks, different countermeasures have been developed and implemented. For instance, the IEC 60870-5-104 protocol was developed to define the systems used for remote control in electrical engineering and power system automation applications. Starting from these considerations, in this paper, we propose an intrusion detector based on explainable Deep Le
Los estilos APA, Harvard, Vancouver, ISO, etc.
Ofrecemos descuentos en todos los planes premium para autores cuyas obras están incluidas en selecciones literarias temáticas. ¡Contáctenos para obtener un código promocional único!