JM Lee, S Hong - IEEE Access, 2020 - ieeexplore.ieee.org
Cyber attacks targeting the Supervisory Control and Data Acquisition (SCADA) systems are becoming more complex and more intelligent. Currently proposed security measures for the …
S Hong, JM Lee, M Altaha, M Aslam - system, 2020 - researchgate.net
Security monitoring is a viable solution to enhance the security capability in the current power control Supervisory Control and Data Acquisition (SCADA) system, more broadly …
JM Lee, S Hong - 2020 6th IEEE Congress on Information …, 2021 - ieeexplore.ieee.org
Recent cyberattacks targeting Supervisory Control and Data Acquisition (SCADA)/Industrial Control System (ICS) exploit weaknesses of host system software environment and take …
S Hong - Int. J. Smart Grid Clean Energy, 2019 - ijsgce.com
As cyber security in the substation automation system and the smart grid has been recognized critical, a plethora of documents related to cyber security have been published …
S Hong, JM Lee - 5th EECSS, 2019 - researchgate.net
All security measures which have been proposed ultimately come under three security strategies: network separation, communication message security, and security monitoring …
Abstract Industrial Control Systems (ICS) are computer systems used for monitoring and controlling industrial facilities such as water treatment facilities, power plants, manufacturing …