0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Hardcover, 1st ed. 2020): Beibei Li, Rongxing... Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Hardcover, 1st ed. 2020)
Beibei Li, Rongxing Lu, Gaoxi Xiao
R2,653 Discovery Miles 26 530 Ships in 18 - 22 working days

This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
R1,875 Discovery Miles 18 750 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 - Security and Privacy of Internet of Things; TSP 2019 - Trust, Security and Privacy for Emerging Applications; SCS 2019 - Sensor-Cloud Systems; UbiSafe 2019 - UbiSafe Computing; ISSR 2019 - Security in e-Science and e-Research; CMRM 2019 - Cybersecurity Metrics and Risk Modeling.

Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018,... Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
R2,798 Discovery Miles 27 980 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Querying over Encrypted Data in Smart Grids (Paperback, 2014): Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin... Querying over Encrypted Data in Smart Grids (Paperback, 2014)
Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
R1,592 Discovery Miles 15 920 Ships in 18 - 22 working days

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.

Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.): Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.)
Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022,... Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Jia Geng Chen, Debiao He, Rongxing Lu
R1,785 R1,682 Discovery Miles 16 820 Save R103 (6%) Ships in 9 - 17 working days

This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.

Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October... Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya
R2,971 Discovery Miles 29 710 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022, which was held in October 2022. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers and 10 short papers, presented were carefully reviewed and selected from 91 submissions. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Paperback, 1st ed. 2020): Beibei Li, Rongxing... Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Paperback, 1st ed. 2020)
Beibei Li, Rongxing Lu, Gaoxi Xiao
R2,621 Discovery Miles 26 210 Ships in 18 - 22 working days

This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The SABC 8
Foeta Krige Paperback R325 Discovery Miles 3 250
The Aura Of Boxing
David Scott, Max Kandhola Hardcover R864 R799 Discovery Miles 7 990
The Lifegiving Home - Creating A Place…
Sally Clarkson Paperback R471 R427 Discovery Miles 4 270
Relentless: 12 Rounds to Success…
Eddie Hearn Paperback R372 R338 Discovery Miles 3 380
Into the Twilight, Endlessly Grousing
Patrick F McManus Paperback R401 R367 Discovery Miles 3 670
Descending the Mountain - Returning to…
Gianna Giavelli Hardcover R900 Discovery Miles 9 000
The Business Builder's Toolkit - A…
Nic Haralambous Paperback R330 Discovery Miles 3 300
The Religious Art of Zen Master Hakuin
Katsuhiro Yoshizawa, Norman Waddell Paperback R404 Discovery Miles 4 040
The South African Law Of Persons
Jacqueline Heaton Paperback  (7)
R1,006 R920 Discovery Miles 9 200
Together - The Healing Power Of Human…
Vivek H. Murthy Paperback R450 R420 Discovery Miles 4 200

 

Partners