Author:
Liu Miao,Shimin Jia,Mancang Yuan
Publisher
Springer International Publishing
Reference10 articles.
1. Bailey, D., Wright, E.: Practical SCADA for Industry, pp. 236–243 (2015)
2. Cherdantseva, Y., Burnap, P., Blyth, A., et al.: A review of cyber security risk assessment methods for SCADA systems. Comput Secur. 56, 1–27 (2016)
3. Sun, P., Li, J., Wang, C., et al.: A generalized model for wind turbine anomaly identification based on SCADA data. Appl. Energy 168, 550–567 (2016)
4. Castellani, F., Astolfi, D., Sdringola, P., et al.: Analyzing wind turbine directional behavior: SCADA data mining techniques for efficiency and power assessment. Appl. Energy, 510–523 (2017)
5. Rezai, A., Keshavarzi, P., Moravej, Z.: Key management issue in SCADA networks: a review. Eng. Sci. Technol. Int. J., 367–377 (2016)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research on the Development of Intelligent Industrial Control;Advances in Intelligent, Interactive Systems and Applications;2019