Computer Security Handbook
Control systems: smart buildings
IEEE Spectrum
DEUCON: Decentralized End-to-End Utilization Control for Distributed Real-Time Systems
IEEE Transactions on Parallel and Distributed Systems
Research issues in data provenance for streaming environments
Proceedings of the 2nd SIGSPATIAL ACM GIS 2009 International Workshop on Security and Privacy in GIS and LBS
Assuring data trustworthiness: concepts and research challenges
SDM'10 Proceedings of the 7th VLDB conference on Secure data management
Exploiting the critical infrastructure via nontraditional system inputs
Proceedings of the Seventh Annual Workshop on Cyber Security and Information Intelligence Research
An event buffer flooding attack in DNP3 controlled SCADA systems
Proceedings of the Winter Simulation Conference
Hi-index | 0.00 |
Supervisory Control and Data Acquisition, otherwise known as SCADA, is a system for gathering real time data, controlling processes, and monitoring equipment from remote locations. As more companies are implementing an open SCADA architecture through the Internet to monitor critical infrastructure components such as power plants, oil and gas pipelines, chemical refineries, flood control dams, and waste and water systems, vital systems are becoming increasingly open to attack. This paper provides an overview of SCADA, outlines several vulnerabilities of SCADA systems, presents data on known and possible threats, and provides particular remediation strategies for protecting these systems.