Search Results - (( developing acquisition encryption algorithm ) OR ( java application stemming algorithm ))

  • Showing 1 - 3 results of 3
Refine Results
  1. 1

    Secure radio telemetry and data acquisition using wireless data communication system with portable UHF transceivers / Mohd Dani Baba and Deepak Kumar Ghodgaonkar by Baba, Mohd Dani, Ghodgaonkar, Deepak Kumar

    Published 2003
    “…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. …”
    Get full text
    Get full text
    Research Reports
  2. 2
  3. 3

    Cyber vulnerabilities in smart grid and safety measures for energy meters in advanced metering system and smart meter communications by Ayob A., Salim Reza S.M., Hussain A., Saad M.H.M., Amin N.

    Published 2023
    “…This paper analyzes the complete structure of a smart grid system, implementation of technologies such as Supervisory Control and Data Acquisition (SCADA) and smart metering, as well as identifies the potential cyberthreats. …”
    Article