z-logo
open-access-imgOpen Access
Simulating command injection attacks on IEC 60870-5-104 protocol in SCADA system
Author(s) -
Qais Saif Qassim,
Norziana Jamil,
Maslina Daud,
Norhamadi Ja’affar,
Salman Yussof,
Roslan Ismail,
Wan Azlan Wan Kamarulzaman
Publication year - 2018
Publication title -
international journal of engineering and technology
Language(s) - English
Resource type - Journals
ISSN - 2227-524X
DOI - 10.14419/ijet.v7i2.14.12816
Subject(s) - scada , testbed , protocol (science) , computer security , industrial control system , computer science , command and control , iec 61850 , control (management) , embedded system , principal (computer security) , engineering , reliability engineering , computer network , automation , telecommunications , electrical engineering , pathology , artificial intelligence , mechanical engineering , medicine , alternative medicine

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here