Recent Advances in SCADA alarm System

SCADA stands for supervisory control and data acquisition- any application that gets data about a system in order to control that system is a SCADA. Some sensors detect conditions“on” or an “off”. That “on” or an “off” originate as an on/off, Such as a valve sensor or it can represent an analog value that crosses a threshold value. Other sensors measure more complex situations where exact measurement is required. So we have developed a system in which SCADA system may be able to gets the more alarm details than a single discrete alarm point can provide in real time.

[1]  Rune Gustavsson,et al.  Process algebras as support for sustainable systems of services , 2005, Applicable Algebra in Engineering, Communication and Computing.

[2]  Rune Gustavsson,et al.  An Experiment Driven Approach Towards Dependable and Sustainable Future Energy Systems. , 2006 .

[3]  Hafiz Abdur Rahman,et al.  Identification of sources of failures and their propagation in critical infrastructures from 12 years of public failure reports , 2009, Int. J. Crit. Infrastructures.

[4]  Per Mellstrand Protecting Software Execution by Dynamic Environment Hardening , 2005 .

[5]  Rune Gustavsson,et al.  Sustainable Virtual Utilities Based on Microgrids , 2008 .

[6]  J. K. Kok,et al.  Field tests applying multi-agent technology for distributed control: virtual power plants and wind energy , 2006 .

[7]  Guus Schreiber,et al.  Knowledge Engineering and Management: The CommonKADS Methodology , 1999 .

[8]  T. Lewis Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation , 2006 .

[9]  Per Mellstrand Informed System Protection , 2007 .

[10]  Horst F. Wedde,et al.  The emerging communication architecture in electrical energy supply and its implications , 2006 .

[11]  Rune Gustavsson,et al.  Ensuring Dependability in Service Oriented Computing , 2006, Security and Management.

[12]  Rune Gustavsson Ensuring quality of service in service oriented critical infrastructures. , 2006 .

[13]  Rune Gustavsson,et al.  Information Security Models and Their Economics , 2005 .