Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjailija

Rongxing Lu

Kirjat ja teokset yhdessä paikassa: 7 kirjaa, julkaisuja vuosilta 2013-2021, suosituimpien joukossa Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems. Vertaile teosten hintoja ja tarkista saatavuus suomalaisista kirjakaupoista.

7 kirjaa

Kirjojen julkaisuhaarukka 2013-2021.

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems

Beibei Li; Rongxing Lu; Gaoxi Xiao

Springer Nature Switzerland AG
2021
nidottu
?This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals.Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems

Detection of False Data Injection Attacks in Smart Grid Cyber-Physical Systems

Beibei Li; Rongxing Lu; Gaoxi Xiao

Springer Nature Switzerland AG
2020
sidottu
?This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals.Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
Querying over Encrypted Data in Smart Grids

Querying over Encrypted Data in Smart Grids

Mi Wen; Rongxing Lu; Xiaohui Liang; Jingsheng Lei; Xuemin (Sherman) Shen

Springer International Publishing AG
2014
nidottu
This SpringerBrief presents the concept of the smart grid architecture and investigates the security issues of the smart grid and the existing encrypted data query techniques. Unique characteristics of smart grid impose distinguished challenges on this investigation, such as multidimensional attributes in metering data and finer grained query on each dimension. Three kinds of queries are introduced, namely, equality query, conjunctive query and range query. For the equality query over encrypted metering data, an efficient searchable encryption scheme is introduced and can be applied for auction in emerging smart grid marketing. Later chapters examine the conjunctive query and range query over encrypted data. Different techniques are used, including the Public key Encryption with Keyword Search (PEKS) and Hidden Vector Encryption (HVE), to construct the comparison predicate and range query predicate. Their correctness is demonstrated in the book. Concise and practical, Encrypted Data Querying in Smart Grids is valuable for professionals and researchers involved in data privacy or encryption. It is also useful for graduate students interested in smart grid and related technologies.
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Rongxing Lu

Springer International Publishing AG
2018
nidottu
This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the academics, researchers, and graduate students seeking to exploit secure data aggregation techniques in smart grid communications and Internet of Things (IoT) scenarios.
Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Privacy-Enhancing Aggregation Techniques for Smart Grid Communications

Rongxing Lu

Springer International Publishing AG
2016
sidottu
This book provides an overview of security and privacy issues in smart grid communications, as well as the challenges in addressing these issues. It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection. Offering a comprehensive exploration of various privacy preserving data aggregation techniques, this book is an exceptional resource for the academics, researchers, and graduate students seeking to exploit secure data aggregation techniques in smart grid communications and Internet of Things (IoT) scenarios.
Vehicular Ad Hoc Network Security and Privacy

Vehicular Ad Hoc Network Security and Privacy

Xiaodong Lin; Rongxing Lu

John Wiley Sons Inc
2015
sidottu
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issuesExplores interdisciplinary methods by combining social science, cryptography, and privacy enhancing techniqueRichly illustrated with detailed designs and results for all approaches usedIntroduces standardization and industry activities, and government regulation in secure vehicular networking
Security and Privacy in Mobile Social Networks

Security and Privacy in Mobile Social Networks

Xiaohui Liang; Rongxing Lu; Xiaodong Lin; Xuemin Shen

Springer-Verlag New York Inc.
2013
nidottu
This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications."Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014