|
Showing 1 - 9 of
9 matches in All Departments
This book discusses cybersecurity issues of smart grid
cyber-physical systems, focusing on the detection techniques
against false data injection attacks. The authors discuss passive
and proactive techniques that combat and mitigate two categories of
false data injection attacks, false measurement data injections and
false command data injections in smart grid cyber-physical systems.
These techniques are easy to follow for either professionals or
beginners. With this book, readers can quickly get an overview of
this topic and get ideas of new solutions for false data injections
in smart grid cyber-physical systems. Readers include researchers,
academics, students, and professionals. Presents a comprehensive
summary for the detection techniques of false data injection
attacks in smart grid cyber-physical systems; Reviews false data
injections for either measurement data or command data; Analyzes
passive and proactive approaches to smart grid cyber-physical
systems.
This book discusses cybersecurity issues of smart grid
cyber-physical systems, focusing on the detection techniques
against false data injection attacks. The authors discuss passive
and proactive techniques that combat and mitigate two categories of
false data injection attacks, false measurement data injections and
false command data injections in smart grid cyber-physical systems.
These techniques are easy to follow for either professionals or
beginners. With this book, readers can quickly get an overview of
this topic and get ideas of new solutions for false data injections
in smart grid cyber-physical systems. Readers include researchers,
academics, students, and professionals. Presents a comprehensive
summary for the detection techniques of false data injection
attacks in smart grid cyber-physical systems; Reviews false data
injections for either measurement data or command data; Analyzes
passive and proactive approaches to smart grid cyber-physical
systems.
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
|
R1,629
Discovery Miles 16 290
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 12th
International Conference on Security, Privacy, and Anonymity in
Computation, Communication, and Storage, SpaCCS 2019, held in
Atlanta, GA, USA in July 2019. The 37 full papers were carefully
reviewed and selected from 109 submissions. The papers cover many
dimensions including security algorithms and architectures,
privacy-aware policies, regulations and techniques, anonymous
computation and communication, encompassing fundamental theoretical
approaches, practical experimental projects, and commercial
application systems for computation, communication and storage.
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
|
R2,083
Discovery Miles 20 830
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of six symposiums
and two workshops co-located with SpaCCS 2019, the 12th
International Conference on Security, Privacy, and Anonymity in
Computation, Communication, and Storage. The 26 full papers were
carefully reviewed and selected from 75 submissions. This year's
symposiums and workshops are: SPIoT 2019 - Security and Privacy of
Internet of Things; TSP 2019 - Trust, Security and Privacy for
Emerging Applications; SCS 2019 - Sensor-Cloud Systems; UbiSafe
2019 - UbiSafe Computing; ISSR 2019 - Security in e-Science and
e-Research; CMRM 2019 - Cybersecurity Metrics and Risk Modeling.
|
Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
|
R3,128
Discovery Miles 31 280
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 20th
International Conference on Information and Communications
Security, ICICS 2018, held in Lille, France, in October 2018. The
39 revised full papers and 11 short papers presented were carefully
selected from 202 submissions. The papers are organized in topics
on blockchain technology, malware, botnet and network security,
real-world cryptography, encrypted computing, privacy protection,
signature schemes, attack analysis and detection, searchable
encryption and identity-based cryptography, verifiable storage and
computing, applied cryptography, supporting techniques, formal
analysis and cryptanalysis, attack detection, and security
management.
This SpringerBrief presents the concept of the smart grid
architecture and investigates the security issues of the smart grid
and the existing encrypted data query techniques. Unique
characteristics of smart grid impose distinguished challenges on
this investigation, such as multidimensional attributes in metering
data and finer grained query on each dimension. Three kinds of
queries are introduced, namely, equality query, conjunctive query
and range query. For the equality query over encrypted metering
data, an efficient searchable encryption scheme is introduced and
can be applied for auction in emerging smart grid marketing. Later
chapters examine the conjunctive query and range query over
encrypted data. Different techniques are used, including the Public
key Encryption with Keyword Search (PEKS) and Hidden Vector
Encryption (HVE), to construct the comparison predicate and range
query predicate. Their correctness is demonstrated in the book.
Concise and practical, Encrypted Data Querying in Smart Grids is
valuable for professionals and researchers involved in data privacy
or encryption. It is also useful for graduate students interested
in smart grid and related technologies.
This book focuses on three emerging research topics in mobile
social networks (MSNs): privacy-preserving profile matching (PPM)
protocols, privacy-preserving cooperative data forwarding (PDF)
protocols, and trustworthy service evaluation (TSE) systems. The
PPM helps two users compare their personal profiles without
disclosing the profiles. The PDF helps users forward data to their
friends via multiple cooperative relay peers while preserving their
identity and location privacy. The TSE enables users to locally
share service reviews on the vendors such that users receive more
valuable information about the services not only from vendors but
also from their trusted social friends. The authors address both
theoretic and practical aspects of these topics by introducing the
system model, reviewing the related works, and presenting the
solutions. Security and Privacy for Mobile Social Networks further
provides the security analysis and the performance evaluation based
on real-trace simulations. It also summarizes the future research
directions for this rapidly growing area of research. The book will
be valuable for researchers and practitioners who work with mobile
social networks, communication platforms, wireless communication
techniques, and internet applications. "Suitable for any type of
reader as an introduction to the topic... The chapters are well
motivated and presented... It is recommended for researchers." -ACM
Computing Reviews, 21 July 2014
|
Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Jia Geng Chen, Debiao He, Rongxing Lu
|
R2,305
Discovery Miles 23 050
|
Ships in 10 - 15 working days
|
This volume constitutes selected papers presented at the Third
International Symposium on Emerging Information Security and
Applications, EISA 2022, held in Wuhan, China, in October 2022. Due
to COVID-19, EISA 2022 was held fully online. The 13 full papers
presented in this volume were thoroughly reviewed and selected from
the 35 submissions. They present a discussion on the emerging
techniques, theories and applications to enhance information and
application security in practice.
|
Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya
|
R3,320
Discovery Miles 33 200
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 22nd
International Conference on Algorithms and Architectures for
Parallel Processing, ICA3PP 2022, which was held in October 2022.
Due to COVID-19 pandemic the conference was held virtually. The 33
full papers and 10 short papers, presented were carefully reviewed
and selected from 91 submissions. The papers cover many dimensions
of parallel algorithms and architectures, encompassing fundamental
theoretical approaches, practical experimental projects, and
commercial components and systems
|
|