Learn More
The paper presents the proportional, integral and derivative (PID) digital controller based cascade control system and its experimental validation through three different testing scenarios namely, control action through Supervisory Control and Data Acquisition (SCADA), control action using Programmable Logic Controller (PLC) and interfacing of PLC with(More)
Nowadays a lot of people are using the internet for sharing their personal and business information where there may be a chance for intruder to access the information. Hence, there is a need to take proper attention to overcome the vulnerabilities in the web pages. SQLI (SQL Injection) is a commonly occurring vulnerability where the intruder tries to access(More)
A " botnet " consists of a network of compromised computers controlled by an attacker (" botmaster "). Recently, botnets have become the root cause of many Internet attacks. To be well prepared for future attacks, it is not enough to study how to detect and defend against the botnets that have appeared in the past. More importantly, we should study advanced(More)
  • 1