Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (3)
  • Open Access

    ARTICLE

    Unveiling CyberFortis: A Unified Security Framework for IIoT-SCADA Systems with SiamDQN-AE FusionNet and PopHydra Optimizer

    Kuncham Sreenivasa Rao1, Rajitha Kotoju2, B. Ramana Reddy3, Taher Al-Shehari4, Nasser A. Alsadhan5, Subhav Singh6,7,8, Shitharth Selvarajan9,10,11,*

    CMC-Computers, Materials & Continua, Vol.85, No.1, pp. 1899-1916, 2025, DOI:10.32604/cmc.2025.064728 - 29 August 2025

    Abstract Protecting Supervisory Control and Data Acquisition-Industrial Internet of Things (SCADA-IIoT) systems against intruders has become essential since industrial control systems now oversee critical infrastructure, and cyber attackers more frequently target these systems. Due to their connection of physical assets with digital networks, SCADA-IIoT systems face substantial risks from multiple attack types, including Distributed Denial of Service (DDoS), spoofing, and more advanced intrusion methods. Previous research in this field faces challenges due to insufficient solutions, as current intrusion detection systems lack the necessary accuracy, scalability, and adaptability needed for IIoT environments. This paper introduces CyberFortis, a… More >

  • Open Access

    ARTICLE

    Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security

    Sunil K. Singh1, Sudhakar Kumar1,*, Manraj Singh1, Savita Gupta2, Razaz Waheeb Attar3, Varsha Arya4,5, Ahmed Alhomoud6, Brij B. Gupta7,8,9

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 3927-3941, 2025, DOI:10.32604/cmc.2025.059643 - 03 July 2025

    Abstract As quantum computing continues to advance, traditional cryptographic methods are increasingly challenged, particularly when it comes to securing critical systems like Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential for monitoring and controlling industrial operations, making their security paramount. A key threat arises from Shor’s algorithm, a powerful quantum computing tool that can compromise current hash functions, leading to significant concerns about data integrity and confidentiality. To tackle these issues, this article introduces a novel Quantum-Resistant Hash Algorithm (QRHA) known as the Modular Hash Learning Algorithm (MHLA). This algorithm is meticulously crafted… More >

  • Open Access

    ARTICLE

    Performance Assessment and Configuration Analysis in the Study of SCADA System (Supervisory Control and Data Acquisition)

    R. Vanalakshmi1, S. Maragathasundari1,*, M. Kameswari1, B. Balamurugan2, C. Swedheetha3

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1399-1419, 2023, DOI:10.32604/iasc.2023.038506 - 21 June 2023

    Abstract Queuing models are used to assess the functionality and aesthetics of SCADA systems for supervisory control and data collection. Here, the main emphasis is on how the queuing theory can be used in the system’s design and analysis. The analysis’s findings indicate that by using queuing models, cost-performance ratios close to the ideal might be attained. This article discusses a novel methodology for evaluating the service-oriented survivability of SCADA systems. In order to evaluate the state of service performance and the system’s overall resilience, the framework applies queuing theory to an analytical model. As a More >

Displaying 1-10 on page 1 of 3. Per Page