Asee peer logo
Displaying all 2 results
Conference Session
Instrumentation Division Technical Session 1
Collection
2020 ASEE Virtual Annual Conference Content Access
Authors
Hector E. Medina, Liberty University; Jonathan Tristan Polk, Liberty University
Tagged Topics
Diversity
Tagged Divisions
Instrumentation
environmentfor cyber-physical system research. A team currently using the IST extensively for this purpose is theInternational Critical Infrastructure Security Institute (ICISI) headquartered at the CERE.Background Scaled-down thermal-hydraulic test loops are a common method in the nuclear industry forobtaining critical information for the design and operation of new fuel and reactor design types. Whendeveloping a reduced-scale testing facility such as this IST, it is important to choose for whichcharacteristics similitude is desired. Since a full-scale model would be impractical and it is impossible toemulate all of the characteristics of a full-scale model in a scaled facility, it is important to prioritizewhich characteristics of the IST will be
Conference Session
Instrumentation Division Technical Session 2
Collection
2018 ASEE Annual Conference & Exposition
Authors
Faruk Yildiz, Sam Houston State University; James Holekamp, Sam Houston State University; Reg Recayi Pecen, Sam Houston State University; Umit Karabiyik, Sam Houston State University; Keith L. Coogler, Sam Houston State University; Jeremy Ryan England
Tagged Topics
Diversity
Tagged Divisions
Instrumentation
systems play an integral role in large-scale processes for interfacing with transducers and machinery for real time control and dataacquisition. The increasing demand to integrate SCADA systems with remote networks andInternet of Things (IoT) technologies has raised concerns for information security specialists.These systems are thought to have notable security vulnerabilities and may be subject to anincreasing number of cyber threats. In this paper/project, several students from Sam Houston StateUniversity design and deploy a SCADA laboratory to better understand these systems and theinherent security threats that go with them. The details including system infrastructure, challengesfaced during the establishment of the laboratory, student and