SCADA

Results: 1691



#Item
211Ciphertext / Cyclic redundancy check / RSA / Known-plaintext attack / Cipher / Cryptography / Block cipher modes of operation / Stream cipher

Chapter 1 PREDICTIVE YASIR: HIGH SECURITY WITH LOWER LATENCY IN LEGACY SCADA Rouslan V. Solomakhin, Patrick P. Tsang and Sean W. Smith Abstract

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2010-06-15 09:06:35
212Cyberwarfare / Computer network security / Cryptography / Hacking / Vulnerability / Parsing / Computer insecurity / SCADA / Penetration test / Software testing / Computer security / Technology

SECURE V2V COMMUNICATION ! A Technique for Secure
 Vehicle-to-Vehicle Communication

Add to Reading List

Source URL: galois.com

Language: English - Date: 2014-07-23 20:12:18
213World Wide Web / Industrial automation / SCADA / Telemetry / Recursion / Ovi / Reseller / Dallas / Geography of Texas / Technology / Computing

Contact Information Applicant Name: Company Legal Name: DBA (if applicable): Street Address: (No P.O. Box please) City:

Add to Reading List

Source URL: www.recursionsw.com

Language: English - Date: 2012-10-18 11:06:58
214Technology / Electric power distribution / Smart grid / Open Systems International / Electrical grid / SCADA / Federal Energy Regulatory Commission / Energy management system / Smart grid policy in the United States / Electric power / Electric power transmission systems / Energy

Bahman_Hoveida_World-Gen_Interview_Rework

Add to Reading List

Source URL: www.osii.com

Language: English - Date: 2014-01-20 12:22:46
215Computing / Technology / Computer network security / Crime prevention / National security / Intel / Security controls / SCADA / Information security / Computer security / Security / Data security

Insights Factory of the Future Intel shares its insights into protecting critical infrastructure and industrial control systems.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-01 21:34:58
216Electromagnetism / Industrial automation / SCADA / Smart grid / Remote Terminal Unit / Recloser / Electric power system / Tamper resistance / Technology / Telemetry / Electric power

Tamper Event Detection on Distributed Devices in Critical Infrastructure Jason Reeves, Sean Smith Dartmouth College {reeves, sws}@cs.dartmouth.edu Abstract Utilities are currently installing a number of resource-constrai

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2015-01-12 18:09:56
217Technology / Telemetry / Hacking / National security / Idaho National Laboratory / SCADA / Vulnerability / Attack / Industrial control system / Computer network security / Computer security / Cyberwarfare

INL NSTB_Common_Vulnerabilities_FY2010.pdf

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:31:19
218HMAC / Transmission Control Protocol / SCADA / Public-key cryptography / Block cipher modes of operation / Key / Cipher / Cryptography / Message authentication codes / Hashing

Crypto Corner Editors: Peter Gutmann, David Naccache, Charles C. Palmer, Room at the Bottom

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2011-08-15 15:03:54
219Industrial automation / SCADA / Telemetry / Microsoft Excel / Opc server / Flow / Software / Technology / Computing

eaSyTechnology XLReporter for the Water and Wastewater Industry April, 2014

Add to Reading List

Source URL: www.thereportcompany.com

Language: English - Date: 2014-04-11 17:55:06
220Electrical engineering / Telemetry / Electromagnetism / Switchgear / Fuse / Remote Terminal Unit / Ring circuit / Switch / SCADA / Technology / Electrical wiring / Electrical components

5244 Trident Brochure March '07

Add to Reading List

Source URL: www.zest.co.za

Language: English - Date: 2013-09-26 05:49:29
UPDATE