IT Security for SCADA (original) (raw)

Cyber-Security for ICS/SCADA

Barend Pretorius

International Journal of Cyber Warfare and Terrorism, 2016

View PDFchevron_right

SCADA SYSTEM VULNERABILITY AND THREAT TO CRITICAL INFRASTRUCTURE

yogesh sahu

View PDFchevron_right

SCADA for National Critical Infrastructures: Review of the Security Threats, Vulnerabilities and Countermeasures

Engr. Fidelis C. Obodoeze

International Journal of Trend in Scientific Research and Development, 2018

View PDFchevron_right

SECURITY THREATS TO SCADA SYSTEMS

Dr Kalpana Chauhan, Dr. Rajeev Kumar Chauhan

View PDFchevron_right

Cybersecurity Risks With Supervisory Control and Data Acquisition (SCADA) Systems is a Public Health and National Security Issue

Dr. Horace Mingo

Handbook of Research on Cybersecurity Risk in Contemporary Business Systems, 2023

View PDFchevron_right

Towards Cyber Secured Scada Systems

Hasan Dag

2018

View PDFchevron_right

PROTECTION TRENDS IN SCADA CYBER THREATS

iJSRED Journal

View PDFchevron_right

A Taxonomy of Cyber Attacks on SCADA Systems

Marwah Obaid

View PDFchevron_right

Security Solution to Protect SCADA Systems from Cyber Attacks

peeyush jain

View PDFchevron_right

Identifying and Scoring Vulnerability in SCADA Environments

Abdullah Abuhussein

View PDFchevron_right

Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks

Elena Sitnikova

View PDFchevron_right

SCADA Systems Cyber Security for Critical Infrastructures

Elena Sitnikova

International Journal of Cyber Warfare and Terrorism, 2016

View PDFchevron_right

Analysis and Planning of the Cyber Security of SCADA Networks

Najeh Lakhoua

2017

View PDFchevron_right

Investigating the Security of Power System SCADA

Ed Chikuni

2007

View PDFchevron_right

Improving Security in SCADA Systems

samad araghi

View PDFchevron_right

SCADA Systems in South Africa and Their Vulnerabilities

Renier van Heerden

View PDFchevron_right

Critical briefing on attacks against Industrial Control Systems especially SCADA systems

Florian Grunert

2010

View PDFchevron_right

SCADA Insecurity: the most worrying cyber attack

Marco Capriz

View PDFchevron_right

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

Alireza Keshavarz-Haddad

International Journal of Computer Applications, 2015

View PDFchevron_right

A Survey on SCADA Systems: Secure Protocols, Incidents, Threats and Tactics

Thomas Lagkas

IEEE Communications Surveys & Tutorials

View PDFchevron_right

The Scada Review: System Components, Architecture, Protocols and Future Security Trends

Shahrulniza Musa

American Journal of Applied Sciences

View PDFchevron_right

Issues of cyber security in SCADA-systems - on the importance of awareness

Erik Johansson

IET Conference Publications, 2009

View PDFchevron_right

MEASURING THE CYBER SECURITY RISK ASSESSMENT METHODS FOR SCADA SYSTEM

GJESRM Journal, Nazmul Hossain, Taposh Das

View PDFchevron_right

Internal security attacks on SCADA systems

Ali Chehab

2013 Third International Conference on Communications and Information Technology (ICCIT), 2013

View PDFchevron_right

Vulnerability Assessment of Cybersecurity for SCADA Systems

Chen-ching Liu

IEEE Transactions on Power Systems, 2000

View PDFchevron_right

Cyber-security of SCADA systems

György Dán

2012 IEEE PES Innovative Smart Grid Technologies (ISGT), 2012

View PDFchevron_right

A Security Architecture for SCADA Systems

Mahalingam Ramkumar

Journal of Information Security, 2018

View PDFchevron_right

Secure Management of SCADA Networks

Javier Miranda López

View PDFchevron_right

Industrial Control Systems Security and Supervisory Control and Data Acquisition (SCADA

IJMTST - International Journal for Modern Trends in Science and Technology (ISSN:2455-3778)

View PDFchevron_right

EC Efforts in SCADA-Related Research: Selected Projects

David Bakken

View PDFchevron_right

Exploring security controls for ICS/SCADA environments

Pedro Barreiros

2020

View PDFchevron_right

The Security Survey and Anaylsis on Supervisory Control and Data Acquisition Communication

Shahrulniza Musa

Journal of Computer Science, 2014

View PDFchevron_right