Search Results - (( developing acquisition encryption algorithm ) OR ( java application stemming algorithm ))
Search alternatives:
- developing acquisition »
- application stemming »
- stemming algorithm »
- java application »
-
1
Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar
Published 2003“…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
Get full text
Get full text
Research Reports -
2
Encryption method for SCADA security enhancement
Published 2014Get full text
Get full text
Get full text
Article -
3
Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications
Published 2023“…This paper analyzes the complete structure of a smart grid system, implementation of technologies such as Supervisory Control and Data Acquisition (SCADA) and smart metering, as well as identifies the potential cyberthreats. …”
Article
