نتایج جستجو برای: scada

تعداد نتایج: 1605  

2017

The Supervisory Control and Data Acquisition (SCADA) systems are gathering information or data from different sensors nodes sent in remote areas and after that transmitted to a focal controller which then oversees and controls this information. Wireless communications for Supervisory Control and Data Acquisition (SCADA) is obliged to applications where wired correspondences to the remote site a...

2013
S. L. P. Yasakethu J. Jiang

SCADA (Supervisory Control And Data Acquisition) systems have always been susceptible to cyber-attacks. Different types of cyber-attacks could occur depending on the architecture and configurations used in the SCADA system. To protect cyber infrastructure from above attacks a growing collaborative effort between cyber security professionals and researchers from private and academia has involved...

2014
Yuancheng Li Shengnan Chu

Electric power SCADA (Supervisory Control and Data Acquisition) system gradually transforming from a separate private network to an open public network, seriously increases the vulnerability risk in electric power SCADA. In order to assess the vulnerability risk in electric power SCADA system, the paper firstly uses Delphi method and AHP (Analytic Hierarchy Process) to build an index system of ...

2014
Leandros A. Maglaras Jianmin Jiang

In this paper we present a intrusion detection module capable of detecting malicious network traffic in a SCADA (Supervisory Control and Data Acquisition) system. Malicious data in a SCADA system disrupt its correct functioning and tamper with its normal operation. OCSVM (One-Class Support Vector Machine) is an intrusion detection mechanism that does not need any labeled data for training or an...

2001
L. Bernardo A. Carandang

The Sensory Control and Data Acquisition Total Environment Management System (SCADA-TEMS) is a distributed multi-access computer controlled data acquisition and control system. The system is composed of multiple sensory and control modules that perform tasks ranging from controlling remote equipment to collecting, multiplexing and manipulating data. The SCADA-TEMS main control module performs t...

پایان نامه :دانشگاه آزاد اسلامی - دانشگاه آزاد اسلامی واحد تهران مرکزی - دانشکده مهندسی 1392

در این پایان نامه طراحی و پیاده سازی یک کنترل کننده صنعتی هوشمند با قابلیت ارتباط توسط پروتکل های صنعتی استاندارد با نرم افزار scada ارائه شده است . در این پروژه از نرم افزار scada به عنوان نرم افزار سیتم مانیتورینگ و کاربری استفاده شده است و نحوه ارتباط نرم افزار scada در بستر tcp/ip انجام می گیرد .به گونه ای که در بستر tcp/ip برای حفظ فاکتورهای امنیتی و کاهش ضریب خطا از دو پروتکل mod bus و p...

پایان نامه :دانشگاه تربیت معلم - سبزوار - دانشکده برق 1389

این رساله در شش فصل تدوین شده که در فصل اول به تعریف و تاریخچه سیستم های scada می پردازد. در فصل دوم اجزای سیستم های scada مانند rtu ها، معماری سخت و نرم افزاری این سیستم ها، شبکه های ارتباطی و رابط سیستم و کاربر hmi تشریح شده است. در فصل سوم پروتکل های scada و سازمان های مرتبط توصیف و از میان تعداد زیادی پروتکل موجود به انتخاب پروتکل dnp3 با دلایل مشروحه می پردازیم. در فصل چهارم مکانیزم های ام...

Journal: :ISA transactions 2004
M Patel G R Cole T L Pryor N A Wilmot

This document summarizes the supervisory control and data acquisition (SCADA) system that allows communication with, and controlling the output of, various I/O devices in the renewable energy systems and components test facility RESLab. This SCADA system differs from traditional SCADA systems in that it supports a continuously changing operating environment depending on the test to be performed...

2008
Mariana Hentea

Executive Summary The continuous growth of cyber security threats and attacks including the increasing sophistication of malware is impacting the security of critical infrastructure, industrial control systems, and Supervisory Control and Data Acquisition (SCADA) control systems. The reliable operation of modern infrastructures depends on computerized systems and SCADA systems. Since the emerge...

2010
Bonnie Zhu Shankar Sastry

Due to standardization and connectivity to the Internet, Supervisory Control and Data Acquisition (SCADA) systems now face the threat of cyber attacks. SCADA systems were designed without cyber security in mind and hence the problem of how to modify conventional Information Technology (IT) intrusion detection techniques to suit the needs of SCADA is a big challenge. We explain the nuance associ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید