Intelligent Mobile Agent Middleware for Wireless Sensor Networks: A Real Time Application Case Study
AICT '08 Proceedings of the 2008 Fourth Advanced International Conference on Telecommunications
Analysis of Distributed Intrusion Detection Systems Using Mobile Agents
ICETET '08 Proceedings of the 2008 First International Conference on Emerging Trends in Engineering and Technology
Intrusion Monitoring in Process Control Systems
HICSS '09 Proceedings of the 42nd Hawaii International Conference on System Sciences
Research challenges for the security of control systems
HOTSEC'08 Proceedings of the 3rd conference on Hot topics in security
Improving the cyber security of SCADA communication networks
Communications of the ACM - Barbara Liskov: ACM's A.M. Turing Award Winner
Agilla: A mobile agent middleware for self-adaptive wireless sensor networks
ACM Transactions on Autonomous and Adaptive Systems (TAAS)
Adaptive Dispatching of Incidences Based on Reputation for SCADA Systems
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
A survey on communication networks for electric system automation
Computer Networks: The International Journal of Computer and Telecommunications Networking
Neural network based intrusion detection system for critical infrastructures
IJCNN'09 Proceedings of the 2009 international joint conference on Neural Networks
Hi-index | 0.00 |
SCADA Systems can be seen as a fundamental component in Critical Infrastructures, having an impact in the overall performance of other Critical Infrastructures interconnected. Currently, these systems include in their network designs different types of Information and Communication Technology systems (such as the Internet and wireless technologies), not only to modernize operational processes but also to ensure automation and real-time control. Nonetheless, the use of these new technologies will bring new security challenges, which will have a significant impact on both the business process and home users. Therefore, the main purpose of this Chapter is to address these issues and to analyze the interdependencies of Process Control Systems with ICT systems, to discuss some security aspects and to offer some possible solutions and recommendations.