0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Paperback, 1st ed. 2020): Beibei Li, Rongxing... Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Paperback, 1st ed. 2020)
Beibei Li, Rongxing Lu, Gaoxi Xiao
R2,920 Discovery Miles 29 200 Ships in 10 - 15 working days

This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Hardcover, 1st ed. 2020): Beibei Li, Rongxing... Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Hardcover, 1st ed. 2020)
Beibei Li, Rongxing Lu, Gaoxi Xiao
R2,595 Discovery Miles 25 950 Ships in 12 - 17 working days

This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
R2,083 Discovery Miles 20 830 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 - Security and Privacy of Internet of Things; TSP 2019 - Trust, Security and Privacy for Emerging Applications; SCS 2019 - Sensor-Cloud Systems; UbiSafe 2019 - UbiSafe Computing; ISSR 2019 - Security in e-Science and e-Research; CMRM 2019 - Cybersecurity Metrics and Risk Modeling.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
R1,629 Discovery Miles 16 290 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018,... Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Querying over Encrypted Data in Smart Grids (Paperback, 2014): Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin... Querying over Encrypted Data in Smart Grids (Paperback, 2014)
Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
R1,773 Discovery Miles 17 730 Ships in 10 - 15 working days

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.

Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.): Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.)
Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen
R1,835 Discovery Miles 18 350 Ships in 10 - 15 working days

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022,... Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Jia Geng Chen, Debiao He, Rongxing Lu
R2,305 Discovery Miles 23 050 Ships in 10 - 15 working days

This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.

Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October... Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya
R3,320 Discovery Miles 33 200 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022, which was held in October 2022. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers and 10 short papers, presented were carefully reviewed and selected from 91 submissions. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Veg - Easy & Delicious Meals For…
Jamie Oliver Hardcover  (6)
R695 R543 Discovery Miles 5 430
House Of Open Wounds
Adrian Tchaikovsky Paperback R480 R384 Discovery Miles 3 840
WINNIE-THE-POOH HAPPY BIRTHDAY TO YOU!
Winnie The Pooh Paperback R162 Discovery Miles 1 620
Beautiful Sacrifice - Maddox Brothers…
Jamie McGuire Paperback R319 Discovery Miles 3 190
Winnie-the-Pooh Little Learners Pocket…
Disney Board book R151 Discovery Miles 1 510
Vital Organs
Suzie Edge Hardcover R599 R490 Discovery Miles 4 900
A Court Of Thorns And Roses: 5-Book…
Sarah J Maas Paperback R1,280 Discovery Miles 12 800
The Carpet People
Terry Pratchett Paperback R267 R212 Discovery Miles 2 120
Skinny Pasta - 80 Flavour-Packed Recipes…
Julia Azzarello Paperback  (1)
R465 Discovery Miles 4 650
Throne of Glass
Sarah J Maas Paperback R275 R220 Discovery Miles 2 200

 

Partners