Tezislər / Theses



Yüklə 17,55 Mb.
Pdf görüntüsü
səhifə134/493
tarix02.10.2023
ölçüsü17,55 Mb.
#151572
1   ...   130   131   132   133   134   135   136   137   ...   493
BHOS Tezisler 2022 17x24sm

THE 3
rd
 INTERNATIONAL SCIENTIFIC CONFERENCES OF STUDENTS AND YOUNG RESEARCHERS 
dedicated to the 99
th
anniversary of the National Leader of Azerbaijan Heydar Aliyev
143
we describe the methodology for the entire process. Encrypt, decrypt, 
authenticate and insert a message into an image, identify a message from a 
stego image, and retrieve a message from a stego image. 
References 
[1] H. Wang, & S.Wang, “Cyber warfare: Steganography vs. Steganalysis”, Communications 
of the ACM, 47:10, October 2014. 
[2] R. Chandramouli, , M. Kharrazi, & N. Memon, “Image steganography and steganalysis: 
Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital 
Watermarking, October 2013. 
[3] Sutaone, M.S., Khandare, M.V, “Image based steganography using LSB insertion 
technique”, IEEE WMMN, pp. 146-151, January 2008. 
[4] M. Dobsicek, “Extended steganographic system”, 8th International Student Conference 
on Electrical Engineering, FEE CTU 2004. 
[5] Nameer N. EL-Emam, “Hiding a large amount of data with high security using 
steganography algorithm”,Journal of Computer Science, Page(s): 223 – 232, April 2007. 
[6] G. Sahoo, R. K. Tiwari, “Designing an Embedded Algorithm for Data Hiding using 
Steganographic Technique by File ybridization”, IJCSNS, Vol. 8, No. 1, pp. 228-233, January 
2008. 
SECURITY DEFICIENCIES IN SCADA SYSTEMS:
HOW TO HANDLE 
Isa Jafarov 
Baku Higher Oil School
Baku, Azerbaijan 
isa.jafarov.std@bhos.edu.az 
Supervisor: Ph.D Associate Professor Naila Allahverdiyeva
Keywords:
Cyber-physical devices, Industrial Control Systems, Cybersecurity 
Isolating modules running on PLC software and other components of a 
SCADA system is a promising approach to prevent an attacker from 
spreading malware to other modules or abusing the full functionalities of the 
operating system. In the fourth industrial revolution, conventional PLCs are 
being replaced by Linux-based smart ones. Since, traditional security strategies 
are no longer appropriate, in this paper, we present cyber security solutions 
that can be applied in SCADA systems. 
A SCADA system is a type of process automation system that collects 
data from sensors and instruments in the field, transmits and displays it at a 
central location, and sends control signals to field equipment. SCADA networks, 
in other words, allow for the receipt of data from remote field devices as well 
as the sending of control messages to remote devices from a control station. 



Yüklə 17,55 Mb.

Dostları ilə paylaş:
1   ...   130   131   132   133   134   135   136   137   ...   493




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin