Beware of SCADA System Vulnerability

被引:0
|
作者
Brilliant, Mark [1 ]
机构
[1] 2M HILL, United States
关键词
D O I
10.1002/j.1551-8701.2010.tb03015.x
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] SCADA system vulnerabilities ... response
    Flannigan, Stephen
    CONTROL ENGINEERING, 2008, 55 (10) : 13 - 13
  • [32] Pipeline SCADA system design
    Huang Yi-hu
    Jia Xi-mei
    Li Qiu-yang
    Proceedings of 2006 Chinese Control and Decision Conference, 2006, : 1402 - 1405
  • [33] How to pick a SCADA system
    Kara, Thomas J.
    Kara, Thomas A.
    Gas Utility and Pipeline Industries, 1998, 42 (10):
  • [34] Cold comfort by SCADA system
    不详
    CONTROL AND INSTRUMENTATION, 1997, 29 (10): : 24 - 24
  • [35] Enhancing SCADA System Security
    Fall, Moustapha
    Chuvalas, Chris
    Warning, Nolan
    Rabiee, Max
    Purdy, Carla
    2020 IEEE 63RD INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS (MWSCAS), 2020, : 830 - 833
  • [36] Visualizing data in SCADA system
    Wu, Yiwen
    Huang, Yizhuang
    Dianli Xitong Zidonghue/Automation of Electric Power Systems, 2000, 24 (14): : 52 - 54
  • [37] Integrated SCADA/HMI and Softlogic system TRACE MODE - basic SCADA system of 'ELNA' company
    Kushnareva, E.A.
    Pribory i Sistemy Upravleniya, 2002, (10): : 21 - 24
  • [38] The Teaching Experiment System of SCADA in Power system
    Liu, Jiajun
    Yao, Lixiao
    Liu, Xiaoyong
    An, Yuan
    Guo, Ya
    Liang, Zhenfeng
    2010 ASIA-PACIFIC POWER AND ENERGY ENGINEERING CONFERENCE (APPEEC), 2010,
  • [39] Beware of The Vulnerability! How Vulnerable Are GitHub's Most Popular PHP Applications?
    Ibrahim, Ahmed
    El-Ramly, Mohammad
    Badr, Amr
    2019 IEEE/ACS 16TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA 2019), 2019,
  • [40] ANDVI: Automated Network Device and Vulnerability Identification in SCADA/ICS by Passive Monitoring
    AL Ghazo, Alaa T.
    Kumar, Ratnesh
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, 54 (04): : 2539 - 2550