Intelligent buildings in smart grids: A survey on security and privacy issues related to energy management
A Llaria, J Dos Santos, G Terrasson, Z Boussaada… - Energies, 2021 - mdpi.com
During the last decade, the smart grid (SG) concept has started to become a reality, mainly
thanks to the technical progress achieved in telecommunications, informatics and power …
thanks to the technical progress achieved in telecommunications, informatics and power …
Design and development of secure data transfer modules in industrial control systems
L Rajesh, P Satyanarayana - Wireless Personal Communications, 2023 - Springer
Industrial control systems (ICS) like supervisory control and data acquisition (SCADA)
systems play a crucial role in monitoring and controlling various process industries in …
systems play a crucial role in monitoring and controlling various process industries in …
An analytics framework for heuristic inference attacks against industrial control systems
Industrial control systems (ICS) of critical infrastructure are increasingly connected to the
Internet for remote site management at scale. However, cyber attacks against ICS-especially …
Internet for remote site management at scale. However, cyber attacks against ICS-especially …
Encrypted negative password identification exploitation RSA rule
NR Sai, T Cherukuri, B Susmita… - 2021 6th …, 2021 - ieeexplore.ieee.org
Security is the fundamental angle for setting solid passwords for all our online media or any
kind of records that are protected The data which is given as an input are secured for privacy …
kind of records that are protected The data which is given as an input are secured for privacy …
Enhancing SCADA System Security
M Fall, C Chuvalas, N Warning… - 2020 IEEE 63rd …, 2020 - ieeexplore.ieee.org
Today's Supervisory Control and Data Acquisition (SCADA) networks manage power grids,
water and sewer systems, automated factories, and many other complex systems. As these …
water and sewer systems, automated factories, and many other complex systems. As these …
A Method for Calculating Efficiency Indicators of Information Security Systems
I Kozubtsov, O Silko, L Kozubtsova… - … 35th Conference of …, 2024 - ieeexplore.ieee.org
Background: As information and communication systems become more sophisticated and
linked, there is an increasing demand for adequate information security and cybersecurity …
linked, there is an increasing demand for adequate information security and cybersecurity …
Secure Communication Protocols for SCADA Systems: Analysis and Comparisons of Different Secure Communication Protocols
RM Aboulsamh, MT Albugaey… - … Women in Data …, 2024 - ieeexplore.ieee.org
Pipeline explosions, nuclear reactor shut-downs, power outages, and oxygen supply
interruptions in intensive care units; SCADA systems with insecure connections are the main …
interruptions in intensive care units; SCADA systems with insecure connections are the main …
Physiological demonstrating of retinal layers for recognizing the level of view of individuals with strabismus
SS Harsha, AV Krishna… - Int. J. of Aquatic …, 2021 - journal-aquaticscience.com
Internet is the backbone for current modern technologies, and globally connected network.
We can transfer required data through internet with accuracy and faster. But in this …
We can transfer required data through internet with accuracy and faster. But in this …
[PDF][PDF] Prediction of Silica Impurity Using Deep Learning Techniques for Mining Environment
SS Harsha, KV Prasad… - … -GESTAO INOVACAO E …, 2021 - revistageintec.net
This research paper proposes the percentage of Silica is measured in a lab experiment it
takes at least one hour for the process engineers to have this value. As this impurity is …
takes at least one hour for the process engineers to have this value. As this impurity is …
[PDF][PDF] Network Safety On Blockchain-Based Applications Across Multiple Domains.
NR Sai, MVS Krishna, MGD Kanthi, MKHK Reddy… - researchgate.net
The associate surveyed making that endeavors to use blockchain for cutting edge veritable
assessment of the most unimaginable constantly followed blockchain disclosure programs …
assessment of the most unimaginable constantly followed blockchain disclosure programs …