Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system
Supervisory control and data acquisition (SCADA) system is the heart of almost every critical infrastructure system, whereby SCADA is generally employed in order to control and to monitor both the physical and industrial processes within these systems. It is, thus, of vital importance that any vulne...
Saved in:
Main Authors: | Qassim, Qais Saif, Jamil, Norziana, Z'aba, Muhammad Reza, Kamarulzaman, Wan Azlan Wan |
---|---|
Format: | Article |
Published: |
Inderscience
2020
|
Subjects: | |
Online Access: | http://eprints.um.edu.my/25378/ https://doi.org/10.1504/IJCIS.2020.107242 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system
by: Qassim Q.S., et al.
Published: (2023) -
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
by: Qassim Q.S., et al.
Published: (2023) -
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
by: Qassim Q.S., et al.
Published: (2023) -
A short review: Issues and threats pertaining the security of SCADA systems
by: Qassim, Qais Saif, et al.
Published: (2021) -
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
by: Jidin R., et al.
Published: (2023)