Detection of false data injection attacks in smart grid cyber-physical systems / / Beibei Li, Rongxing Lu, Gaoxi Xiao |
Autore | Li Beibei |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XVI, 157 p. 61 illus., 39 illus. in color.) |
Disciplina | 621.31028558 |
Collana | Wireless Networks |
Soggetto topico | Smart power grids - Security measures |
ISBN | 3-030-58672-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Foundations and Related Literature -- SPNTA: Stochastic Petri-Net-Based Reliability Analysis under Topology Attacks -- DHCD: Distributed Host-Based Collaborative Detection for FDI Attacks -- DDOA: Dirichlet-Based Detection for Opportunistic Attacks -- PFDD: On Feasibility and Limitations of Detecting FDI Attacks Using DFACTS -- Conclusion. |
Record Nr. | UNINA-9910427676103321 |
Li Beibei | ||
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Detection of false data injection attacks in smart grid cyber-physical systems / / Beibei Li, Rongxing Lu, Gaoxi Xiao |
Autore | Li Beibei |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XVI, 157 p. 61 illus., 39 illus. in color.) |
Disciplina | 621.31028558 |
Collana | Wireless Networks |
Soggetto topico | Smart power grids - Security measures |
ISBN | 3-030-58672-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Foundations and Related Literature -- SPNTA: Stochastic Petri-Net-Based Reliability Analysis under Topology Attacks -- DHCD: Distributed Host-Based Collaborative Detection for FDI Attacks -- DDOA: Dirichlet-Based Detection for Opportunistic Attacks -- PFDD: On Feasibility and Limitations of Detecting FDI Attacks Using DFACTS -- Conclusion. |
Record Nr. | UNISA-996465350003316 |
Li Beibei | ||
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Emerging information security and applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, proceedings / / edited by Jiageng Chen, Debiao He, and Rongxing Lu |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (236 pages) |
Disciplina | 004.6 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks - Security measures
Data protection |
ISBN | 3-031-23098-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks. |
Record Nr. | UNINA-9910640386003321 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Emerging information security and applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, proceedings / / edited by Jiageng Chen, Debiao He, and Rongxing Lu |
Edizione | [1st ed. 2022.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2023] |
Descrizione fisica | 1 online resource (236 pages) |
Disciplina | 004.6 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computer networks - Security measures
Data protection |
ISBN | 3-031-23098-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks. |
Record Nr. | UNISA-996508667603316 |
Cham, Switzerland : , : Springer, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Frontiers in Cyber Security : 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers / / edited by Haomiao Yang, Rongxing Lu |
Edizione | [1st ed. 2024.] |
Pubbl/distr/stampa | Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 |
Descrizione fisica | 1 online resource (XV, 673 p. 174 illus., 143 illus. in color.) |
Disciplina | 929.605 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Data protection
Computer engineering Computer networks Artificial intelligence Computer networks - Security measures Data and Information Security Computer Engineering and Networks Artificial Intelligence Computer Communication Networks Mobile and Network Security |
ISBN | 981-9993-31-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain and Distributed Systems -- Secure Cross-chain Transaction for Medical Data Sharing in Blockchain-based Internet of Medical Things -- An blockchain-based proxy re-encryption scheme with cryptographic reverse firewall for IoV -- SCCT-DARS: Secure and Compliant Cryptocurrency Transactions in a Decentralized Anonymous Regulated System -- ODSC: A Unique Chameleon Hash-based Application Framework for Blockchain Smart Contracts -- Cross-chain Identity Authentication for BIoMT with Multi-chain Fusion Mode -- Blockchain-based signature scheme with cryptographic reverse firewalls for IoV -- Network Security and Privacy Protection -- A Hierarchical Asynchronous Federated Learning Privacy-Preserving Framework for IoVs -- A Secure Mutual Authentication Scheme for Wireless Communication -- A Multi-tab Webpage Fingerprinting Method Based on Multi-head Self-attention -- Improving Accuracy of Interactive Queries in Personalized Differential Privacy -- VPSearch+: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search without Client Storage Overhead -- Security-Enhanced Function Privacy Attribute-Based Encryption -- Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid -- Byzantine-robust Privacy-preserving Federated Learning based on DT-PKC -- Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy -- Efficient and Secure Count Queries on Encrypted Genomic Data -- Automatic construction of knowledge graph for personal sensitive data -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification -- ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain -- A New Self-Dual-BKZ algorithm based on Lattice Sieving -- A Certificateless Designated Verifier Sanitizable Signature -- An Inner Product Function Encryption Scheme for Secure Distance Calculation -- Efficient Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring Problem -- Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model -- Heterogeneous Signcryption Scheme With Equality Test for Internet of Vehicles -- An Improved Updatable Signature Scheme with Weakened Token -- A pairing-based certificateless authenticated searchable encryption with MTI guarantees -- Machine Learning and Security -- Anomaly detection method for integrated encrypted malicious traffic based on RFCNN-GRU -- TimeGAN: A Novel Solution to Imbalanced Encrypted Traffic Datasets -- Secure Steganography Scheme based on Steganography Generative Adversarial Network -- SR-GNN: Spectral Residuals with Graph Neural Networks for Anomaly Detection in ADS-B Data -- Learned Pseudo-Random Number Generator based on Generative Adversarial Networks -- An Intrusion Detection System Using Vision Transformer for Representation Learning -- PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile Encrypted Traffic Classification -- A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks -- Federated Long-Tailed Learning by Retraining the Biased Classifier with Prototypes -- Internet of Things and System Security -- Ensuring SLA Compliance of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware Scheme -- A Regenerating Code Based Data Restoration Scheme in Active RFID System -- Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare -- Windows Fuzzing Framework Based on Dynamic Tracing And Process Cloning -- Meta-HFMD: A Hierarchical Feature Fusion Malware Detection Framework via Multi-TaskMeta-Learning -- Privacy-Preserving Cloud-Edge Collaborative K-Means Clustering Model in IoT. |
Record Nr. | UNINA-9910799481203321 |
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information and Communications Security [[electronic resource] ] : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XV, 818 p. 200 illus., 109 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data structures (Computer science)
Software engineering Computer organization Computers Data Structures and Information Theory Software Engineering/Programming and Operating Systems Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service |
ISBN | 3-030-01950-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management. |
Record Nr. | UNISA-996466450103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XV, 818 p. 200 illus., 109 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data structures (Computer science)
Software engineering Computer organization Computers Data Structures and Information Theory Software Engineering/Programming and Operating Systems Computer Systems Organization and Communication Networks Computing Milieux Information Systems and Communication Service |
ISBN | 3-030-01950-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management. |
Record Nr. | UNINA-9910349397203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Querying over Encrypted Data in Smart Grids / / by Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen |
Autore | Wen Mi |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (85 p.) |
Disciplina | 005.74 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Electrical engineering Computer communication systems Computer security Cryptology Communications Engineering, Networks Computer Communication Networks Systems and Data Security |
ISBN |
1-322-03987-9
3-319-06355-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Equality Query for Auction in Emerging Smart Grid Marketing -- Conjunctive Query over Encrypted Multidimensional Data -- Range Query over Encrypted Metering Data for Financial Audit -- Conclusions and Future Work. |
Record Nr. | UNINA-9910298563303321 |
Wen Mi | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and privacy in mobile social networks / / Xiaohui Liang [and four others] |
Autore | Liang Xiaohui |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | New York : , : Springer, , 2013 |
Descrizione fisica | 1 online resource (viii, 100 pages) : illustrations (some color) |
Disciplina | 004.6 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer networks
Computer science Data protection Information storage and retrieval systems Telecommunication Online social networks - Security measures Mobile computing - Security measures |
ISBN | 1-4614-8857-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Overview -- Profile Matching Protocol with Anonymity Enhancing Techniques -- Cooperative Data Forwarding Strategy with Privacy Preservation -- Recommendation-based Trustworthy Service Evaluation. |
Record Nr. | UNINA-9910437577703321 |
Liang Xiaohui | ||
New York : , : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XV, 332 p. 127 illus., 97 illus. in color.) |
Disciplina | 658.478 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Data protection
Computer organization Computers Optical data processing Artificial intelligence Security Computer Systems Organization and Communication Networks Information Systems and Communication Service Image Processing and Computer Vision Artificial Intelligence |
ISBN | 3-030-24900-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers. |
Record Nr. | UNISA-996466178903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|