Design of an SCADA-Based Water Flow and Risk Control in Monitoring Systems
Abstract
Full Text:
PDFReferences
B. Zhu, A. Joseph, S. Sastry. A taxonomy of cyber attacks on SCADA systems, In: IEEE International Conferences on Internet of Things, and Cyber, Physical and Social Computing.
A. Shahzad, N. Xiong, M. Irfan, M. Lee, S. Hussain, B. Khaltar. A SCADA Intermediate Simulation Platform to Enhance the System Security. July 1–3, 2015 ICACT2015.
R.S. Ramachandruni, P. Poornachandran. Detecting the network attack vectors on SCADA systems, In: International Conference on Advances in Computing, Communications and Informatics (ICACCI). 2015.
G. Hamoud, R.-L. Chen, I. Bradley. Risk assessment of power systems
SCADA, 0-7803-7989-6/03/$17.00 02003 IEEE, 2003.
J. Guan, J.R. Graham, J.L. Rieb. A digraph model for risk identification and mangement in SCADA systems, 978-1-61284-4577-0085-9/11/$26.00 ©2011 IEEE. 2011.
J.E. Dagle, S.E. Widergren, J.M. Johnson. Enhancing the security of supervisory control and data acquisition (SCADA) systems: the lifeblood of modern energy infrastructures, 2002.
A. Al-Dalky, O. Abduljaleel, K. Salah, H. Otrok, M. Al-Qutayri. A modbus traffic generator for evaluating the security of SCADA systems, In: 9th International Symposium on Communication Systems, Networks & Digital Sign (CSNDSP). 2014.
M. Merabti, M. Kennedy, W. Hurst. Critical infrastructure protection: a 21st century challenge, In: Proc Int Conf Commun Inf Technol (ICCIT). March 2011.
A. Davis, H. Chang. Airport protection using wireless sensor networks, In: Proc IEEE Conf Techno Homeland Secur (HST). Nov. 2012.
J. Chen, M. Daz, L. Llopis, B. Rubio, J.M. Troya. A survey on quality of service support in wireless sensor and actor networks: requirements and challenges in the context of critical infrastructure protection, J Netw.
DOI: https://doi.org/10.37628/ijaem.v3i2.675
Refbacks
- There are currently no refbacks.