Operator action authentication in an industrial control system

S Galpin, T Clish, JG Calvin, A Rooyakkers - US Patent 10,834,094, 2020 - Google Patents
Operator actions and/or other commands or requests are secured via an authentication path
from an action originator to a communications/control module or any other industrial …

A secure energy routing mechanism for sharing renewable energy in smart microgrid

T Zhu, S Xiao, Y Ping, D Towsley… - 2011 IEEE international …, 2011 - ieeexplore.ieee.org
Due to volatile and rising energy prices, smart microgrids appear to be increasingly popular.
Instead of one centrally located power plant, the microgrids will rely on solar panels and …

Secure key exchange with mutual authentication

DR Morais, LT Chen, DV Danieli - US Patent 7,565,537, 2009 - Google Patents
A secure key exchange with mutual authentication allows devices on a network to perform,
in a single roundtrip over the network, the exchange. A key exchange initiator packet that …

Industrial control system redundant communications/control modules authentication

T Clish, S Galpin, JG Calvin, A Rooyakkers - US Patent 9,467,297, 2016 - Google Patents
A set of redundant industrial control system communica tions/control modules includes at
least a first communica tions/control module and a second communications/control module …

Detection and prevention of DNS spoofing attacks

AA Maksutov, IA Cherepanov… - … Siberian Symposium on …, 2017 - ieeexplore.ieee.org
One of the modern MitM-attacks on HTTPS is attacks using SSLstrip and SSLstrip+ utilities,
the latter of which uses a DNS-spoofing type attack. Currently, there are several ways to …

Secure power supply for an industrial control system

A Rooyakkers, JC Calvin - US Patent 10,613,567, 2020 - Google Patents
(57) ABSTRACT A power supply is disclosed for an industrial control system or any system
including a distributed power supply network. In embodiments, the power supply comprises …

Security aspects in IPv6 networks–implementation and testing

D Žagar, K Grgić, S Rimac-Drlje - Computers & Electrical Engineering, 2007 - Elsevier
IPv6 protocol, which should replace the actual IPv4 protocol, brings many new possibilities
and improvements considering simplicity, routing speed, quality of service and security. In …

Electromagnetic connector for an industrial control system

A Rooyakkers, JG Calvin - US Patent 10,832,861, 2020 - Google Patents
An electromagnetic connector is disclosed that is configured to form a first magnetic circuit
portion comprising a first core member and a first coil disposed of the first core member. The …

Image capture devices for a secure industrial control system

A Rooyakkers - US Patent 11,144,630, 2021 - Google Patents
An image capture device for a secure industrial control system is disclosed. In an
embodiment, the image capture device includes: an image sensor; a signal processor …

[PDF][PDF] Network Security Threat Detection under Big Data by Using Machine Learning.

J He, J Yang, K Ren, W Zhang, G Li - Int. J. Netw. Secur., 2019 - ijns.jalaxy.com.tw
The efficient detection of network threats has significant meaning to network security. In this
study, the problem of network security threat detection by using machine learning was …