Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Eko Hadiyono Riyadi"'
Publikováno v:
PeerJ Computer Science, Vol 7, p e727 (2021)
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security
Externí odkaz:
https://doaj.org/article/79065179c43848e180ec06114ffc431f
Publikováno v:
International Journal of Intelligent Engineering and Systems. 14:376-386
Most of the communication protocols in the Industrial Control System (ICS) are vulnerable to cyber-attacks. Initially, the network protocol was designed for reliable performance, and thus did not incorporate data transmission security features. There
Publikováno v:
PeerJ Computer Science
PeerJ Computer Science, Vol 7, p e727 (2021)
PeerJ Computer Science, Vol 7, p e727 (2021)
Background Data transmissions using the DNP3 protocol over the internet in SCADA systems are vulnerable to interruption, interception, fabrication, and modification through man-in-the-middle (MITM) attacks. This research aims to improve the security