2015 5th International Conference on Electric Utility Deregulation and Restructuring and Power Technologies (DRPT) 2015
DOI: 10.1109/drpt.2015.7432232
|View full text |Cite
|
Sign up to set email alerts
|

Research on modeling and simulation of communication in power SCADA system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
6
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 0 publications
0
6
0
Order By: Relevance
“…The threat of cyberattacks looms over SCADA systems that communicate with network protocols ( Mantere, Sailio & Noponen, 2013 ; Lee et al, 2014 ; Rahman, Jakaria & Al-Shaer, 2016 ; Amoah, 2016 ; Ahn et al, 2015 ). As such, Hou et al (2016) . investigated the detection of attacks within SCADA systems and network protocols, including the possibility of detecting attacks in smart grids using Dirichlet.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…The threat of cyberattacks looms over SCADA systems that communicate with network protocols ( Mantere, Sailio & Noponen, 2013 ; Lee et al, 2014 ; Rahman, Jakaria & Al-Shaer, 2016 ; Amoah, 2016 ; Ahn et al, 2015 ). As such, Hou et al (2016) . investigated the detection of attacks within SCADA systems and network protocols, including the possibility of detecting attacks in smart grids using Dirichlet.…”
Section: Related Workmentioning
confidence: 97%
“…The analysis and detection of network anomalies must be carried out continuously and periodically, perhaps through modeling and simulation using the OPNET Modeler method ( Hou et al, 2016 ). Sniffing and DDOS attacks may be detected in smart grids with Novel IDS technology ( Shitharth & Winston, 2016 ).…”
Section: Related Workmentioning
confidence: 99%
“…As shown by several current publications, the Nordic 32 test system is still very relevant for power system analysis today [56,57,58,59]. Further, it is supported by the fact that the Nordic 32 test and vice versa to obtain measurement data and perform remote control [65].…”
Section: Mapping On a Corresponding Communication Infrastructurementioning
confidence: 98%
“…The threat of cyberattacks looms over SCADA systems that communicate with network protocols [22], [23], [27], [34], [38]. As such, A. Hou et al investigated the detection of attacks within SCADA systems and network protocols, including the possibility of detecting attacks in smart grids using Dirichlet [39]. Similarly, Mantere et al analyzed the detection of anomalies that could breach security [22].…”
Section: Related Workmentioning
confidence: 99%