Sciweavers

4 search results - page 1 / 1
» Stealthy deception attacks on water SCADA systems
Sort
View
HYBRID
2010
Springer
13 years 11 months ago
Stealthy deception attacks on water SCADA systems
Saurabh Amin, Xavier Litrico, Shankar Sastry, Alex...
ACSW
2006
13 years 6 months ago
SKMA: a key management architecture for SCADA systems
Supervisory Control And Data Acquisition (SCADA) systems are widely used in the management of critical infrastructure such as electricity and water distrubution systems. Currently...
Robert Dawson, Colin Boyd, Ed Dawson, Juan Manuel ...
CDC
2010
IEEE
203views Control Systems» more  CDC 2010»
12 years 11 months ago
Cyber security analysis of state estimators in electric power systems
In this paper, we analyze the cyber security of state estimators in Supervisory Control and Data Acquisition (SCADA) systems operating in power grids. Safe and reliable operation o...
André Teixeira, Saurabh Amin, Henrik Sandbe...
ACNS
2004
Springer
247views Cryptology» more  ACNS 2004»
13 years 10 months ago
Low-Latency Cryptographic Protection for SCADA Communications
Abstract. Supervisory Control And Data Acquisition (SCADA) systems are real-time process control systems that are widely deployed throughout critical infrastructure sectors includi...
Andrew K. Wright, John A. Kinast, Joe McCarty