0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (5)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Hardcover, 1st ed. 2020): Beibei Li, Rongxing... Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Hardcover, 1st ed. 2020)
Beibei Li, Rongxing Lu, Gaoxi Xiao
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Paperback, 1st ed. 2020): Beibei Li, Rongxing... Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems (Paperback, 1st ed. 2020)
Beibei Li, Rongxing Lu, Gaoxi Xiao
R2,754 Discovery Miles 27 540 Ships in 10 - 15 working days

This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - 12th International Conference, SpaCCS 2019, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
R1,536 Discovery Miles 15 360 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage, SpaCCS 2019, held in Atlanta, GA, USA in July 2019. The 37 full papers were carefully reviewed and selected from 109 submissions. The papers cover many dimensions including security algorithms and architectures, privacy-aware policies, regulations and techniques, anonymous computation and communication, encompassing fundamental theoretical approaches, practical experimental projects, and commercial application systems for computation, communication and storage.

Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA,... Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14-17, 2019, Proceedings (Paperback, 1st ed. 2019)
Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
R1,964 Discovery Miles 19 640 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 - Security and Privacy of Internet of Things; TSP 2019 - Trust, Security and Privacy for Emerging Applications; SCS 2019 - Sensor-Cloud Systems; UbiSafe 2019 - UbiSafe Computing; ISSR 2019 - Security in e-Science and e-Research; CMRM 2019 - Cybersecurity Metrics and Risk Modeling.

Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018,... Information and Communications Security - 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings (Paperback, 1st ed. 2018)
David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, …
R2,947 Discovery Miles 29 470 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 20th International Conference on Information and Communications Security, ICICS 2018, held in Lille, France, in October 2018. The 39 revised full papers and 11 short papers presented were carefully selected from 202 submissions. The papers are organized in topics on blockchain technology, malware, botnet and network security, real-world cryptography, encrypted computing, privacy protection, signature schemes, attack analysis and detection, searchable encryption and identity-based cryptography, verifiable storage and computing, applied cryptography, supporting techniques, formal analysis and cryptanalysis, attack detection, and security management.

Querying over Encrypted Data in Smart Grids (Paperback, 2014): Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin... Querying over Encrypted Data in Smart Grids (Paperback, 2014)
Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
R1,670 Discovery Miles 16 700 Ships in 10 - 15 working days

This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.

Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.): Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.)
Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen
R1,727 Discovery Miles 17 270 Ships in 10 - 15 working days

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October... Algorithms and Architectures for Parallel Processing - 22nd International Conference, ICA3PP 2022, Copenhagen, Denmark, October 10-12, 2022, Proceedings (Paperback, 1st ed. 2022)
Weizhi Meng, Rongxing Lu, Geyong Min, Jaideep Vaidya
R3,128 Discovery Miles 31 280 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 22nd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2022, which was held in October 2022. Due to COVID-19 pandemic the conference was held virtually. The 33 full papers and 10 short papers, presented were carefully reviewed and selected from 91 submissions. The papers cover many dimensions of parallel algorithms and architectures, encompassing fundamental theoretical approaches, practical experimental projects, and commercial components and systems

Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022,... Emerging Information Security and Applications - Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, Proceedings (Paperback, 1st ed. 2022)
Jia Geng Chen, Debiao He, Rongxing Lu
R2,174 Discovery Miles 21 740 Ships in 10 - 15 working days

This volume constitutes selected papers presented at the Third International Symposium on Emerging Information Security and Applications, EISA 2022, held in Wuhan, China, in October 2022. Due to COVID-19, EISA 2022 was held fully online. The 13 full papers presented in this volume were thoroughly reviewed and selected from the 35 submissions. They present a discussion on the emerging techniques, theories and applications to enhance information and application security in practice.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Growing Up Is Hard To Do - Reflections…
Jay Spence Hardcover R964 Discovery Miles 9 640
One Line a Day Journal for Teens - Three…
Rockridge Press Paperback R504 R426 Discovery Miles 4 260
The Magic Bracelet
Samira Toussi Hardcover R677 Discovery Miles 6 770
Heroes Wear Masks - Elmo's Super…
Sesame Workshop Paperback R191 R158 Discovery Miles 1 580
A Head Full of Everything - Inspiration…
Gavin Oattes Paperback R396 R285 Discovery Miles 2 850
Becoming a CEO of Self-Confidence - Your…
C Zaki Roshell Hardcover R618 R519 Discovery Miles 5 190
No More Nappies - A Potty-Training Book
Marion Cocklico Board book  (1)
R195 R153 Discovery Miles 1 530
The Bracelet
Becky Archibald Hardcover R522 R445 Discovery Miles 4 450
Self-Esteem Tools for Teens - A Modern…
Megan Maccutcheon Paperback R382 R323 Discovery Miles 3 230
Self Esteem For Teens - Six proven…
Maria Van Noord Hardcover R405 R343 Discovery Miles 3 430

 

Partners