Towards secure model for SCADA systems
Nowadays, Supervisory Control And Data Acquisition (SCADA) systems have huge influences on the human life. They provide a distance remote controlling, monitoring and information gathering of transmission, production and distribution of every automation systems such as electric power, power plants, r...
| Main Authors: | Daryabar, Farid, Dehghantanha, Ali, Udzir, Nur Izura, Mohd Sani, Nor Fazlida, Shamsuddin, Solahuddin |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
IEEE
2012
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/68943/ http://psasir.upm.edu.my/id/eprint/68943/1/Towards%20secure%20model%20for%20SCADA%20systems.pdf |
Similar Items
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013)
by: Daryabar, Farid, et al.
Published: (2013)
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011)
by: Daryabar, Farid, et al.
Published: (2011)
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)
by: Dehghantanha, Ali, et al.
Published: (2011)
A data-centric model for smartphone security
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2013)
Encryption method for SCADA security enhancement
by: Shahzad, Aamir, et al.
Published: (2014)
by: Shahzad, Aamir, et al.
Published: (2014)
Intelligent SCADA based pipe monitoring system
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2011)
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2011)
Deployment of new dynamic cryptography buffer for SCADA security enhancement
by: Aamir, Shahzad, et al.
Published: (2014)
by: Aamir, Shahzad, et al.
Published: (2014)
SCADA system for electrical distribution system
by: Musse, Mohamud Ahmed, et al.
Published: (2011)
by: Musse, Mohamud Ahmed, et al.
Published: (2011)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Review of SCADA systems and IoT honeypots
by: Alquwatli, Mohammed H., et al.
Published: (2020)
by: Alquwatli, Mohammed H., et al.
Published: (2020)
Machine Learning: Application to the Scada System
by: Lee, Sheng Kai
Published: (2019)
by: Lee, Sheng Kai
Published: (2019)
SCADA system for industrial manipulator PLC trainer
by: Nur Hanisah, Azman, et al.
Published: (2022)
by: Nur Hanisah, Azman, et al.
Published: (2022)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
Towards green frameworks for digital forensics investigation
by: Dehghantanha, Ali, et al.
Published: (2013)
by: Dehghantanha, Ali, et al.
Published: (2013)
Security issues and quality of service in real time wireless PLC/SCADA process control systems
by: Eren, Halit, et al.
Published: (2008)
by: Eren, Halit, et al.
Published: (2008)
UPEM : user-centered privacy evaluation model in pervasive computing system.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
UPEM : user-centered privacy evaluation model in pervasive computing systems.
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Volatile memory acquisition using backup for forensic investigation
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
by: Dezfouli, Farhood Norouzizadeh, et al.
Published: (2012)
PC based SCADA System for Reverse Osmosis Desalination Plants
by: Mohamed Torky, Omar, et al.
Published: (2009)
by: Mohamed Torky, Omar, et al.
Published: (2009)
Supervisory Control and Data Acquisition System (SCADA) using microcontroller
by: Azman Shah, Mohammad, et al.
Published: (2011)
by: Azman Shah, Mohammad, et al.
Published: (2011)
Alarm design for SCADA system of assembly cell-200 trainer
by: Zawawi, Mukmin
Published: (2008)
by: Zawawi, Mukmin
Published: (2008)
Alarm design for SCADA system of assembly CELL-200 trainer
by: Zawawi, Mukmin
Published: (2008)
by: Zawawi, Mukmin
Published: (2008)
An empirical study of the characteristics of access control model towards secure KMS in collaborative environment
by: Abu Bakar, Azreena, et al.
Published: (2011)
by: Abu Bakar, Azreena, et al.
Published: (2011)
SCADA software development–indusoft case study
by: Musse, Mohamud Ahmed, et al.
Published: (2011)
by: Musse, Mohamud Ahmed, et al.
Published: (2011)
Hierarchical secure virtualization model for cloud.
by: Manavi, Sina, et al.
Published: (2012)
by: Manavi, Sina, et al.
Published: (2012)
Intelligent SCADA based monitoring scheme for low voltage distribution system
by: Ayodele Isqeel, Abdullateef, et al.
Published: (2011)
by: Ayodele Isqeel, Abdullateef, et al.
Published: (2011)
Cyber attacks analysis and mitigation with machine learning techniques in ICS SCADA systems
by: Mubarak, Sinil, et al.
Published: (2019)
by: Mubarak, Sinil, et al.
Published: (2019)
Low cost SCADA system with auto fault detection using micro controller
by: Shah, M. Azman, et al.
Published: (2005)
by: Shah, M. Azman, et al.
Published: (2005)
Low cost SCADA system with auto fault detection using micro controller
by: Shah, M. Azman, et al.
Published: (2011)
by: Shah, M. Azman, et al.
Published: (2011)
Novel IEEE802.15.4 protocol for modern SCADA
communication systems
by: Shabani, Hikma, et al.
Published: (2014)
by: Shabani, Hikma, et al.
Published: (2014)
A review on current and old SCADA networks applied to water distribution systems
by: Franco, Daniel Jose, et al.
Published: (2019)
by: Franco, Daniel Jose, et al.
Published: (2019)
Use of security patterns for development of secure healthcare information system
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
by: Maher, Zulfikar Ahmed, et al.
Published: (2016)
A formal verification and simulation of Common Criteria Recognition Arrangement (CCRA)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
by: Mat Isa, Mohd Anuar, et al.
Published: (2017)
Towards a dynamic file integrity monitor through a security classification
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
by: Abdullah, Zul Hilmi, et al.
Published: (2011)
Development of prototype real-time system for SCADA-based monitoring and controlling system for sewage treatment plant
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2011)
by: Salami, Momoh Jimoh Eyiomika, et al.
Published: (2011)
Monitoring and control of AC power distribution board through sound card-based SCADA system
by: Jabir, Muhammad
Published: (2014)
by: Jabir, Muhammad
Published: (2014)
Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems
by: Franco, Daniel Jose Da Graca Peceguina
Published: (2021)
by: Franco, Daniel Jose Da Graca Peceguina
Published: (2021)
Cyber warfare trends and future
by: Ganji, Majid, et al.
Published: (2013)
by: Ganji, Majid, et al.
Published: (2013)
Similar Items
-
A survey about impacts of cloud computing on digital forensics
by: Daryabar, Farid, et al.
Published: (2013) -
A survey on privacy impacts of digital investigation
by: Daryabar, Farid, et al.
Published: (2013) -
Analysis of known and unknown malware bypassing techniques
by: Daryabar, Farid, et al.
Published: (2013) -
Investigation of bypassing malware defences and malware detections
by: Daryabar, Farid, et al.
Published: (2011) -
Towards data centric mobile security
by: Dehghantanha, Ali, et al.
Published: (2011)