Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system
Computer crime; Crime; Network security; SCADA systems; Critical infrastructure systems; Electrical power system; Industrial controls; Industrial processs; International standards; Malicious activities; Security vulnerabilities; Supervisory control and dataacquisition systems (SCADA); Electric power...
Saved in:
Main Authors: | Qassim Q.S., Jamil N., Z'aba M.R., Kamarulzaman W.A.W. |
---|---|
Other Authors: | 36613541700 |
Format: | Article |
Published: |
Inderscience Publishers
2023
|
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Assessing the cyber-security of the IEC 60870-5-104 protocol in SCADA system
by: Qassim, Qais Saif, et al.
Published: (2020) -
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
by: Qassim Q.S., et al.
Published: (2023) -
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
by: Qassim Q.S., et al.
Published: (2023) -
A practical SCADA testbed in electrical power system environment for cyber-security exercises
by: Jamil N., et al.
Published: (2023) -
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
by: Jidin R., et al.
Published: (2023)