top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Detection of false data injection attacks in smart grid cyber-physical systems / / Beibei Li, Rongxing Lu, Gaoxi Xiao
Detection of false data injection attacks in smart grid cyber-physical systems / / Beibei Li, Rongxing Lu, Gaoxi Xiao
Autore Li Beibei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XVI, 157 p. 61 illus., 39 illus. in color.)
Disciplina 621.31028558
Collana Wireless Networks
Soggetto topico Smart power grids - Security measures
ISBN 3-030-58672-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Foundations and Related Literature -- SPNTA: Stochastic Petri-Net-Based Reliability Analysis under Topology Attacks -- DHCD: Distributed Host-Based Collaborative Detection for FDI Attacks -- DDOA: Dirichlet-Based Detection for Opportunistic Attacks -- PFDD: On Feasibility and Limitations of Detecting FDI Attacks Using DFACTS -- Conclusion.
Record Nr. UNINA-9910427676103321
Li Beibei  
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of false data injection attacks in smart grid cyber-physical systems / / Beibei Li, Rongxing Lu, Gaoxi Xiao
Detection of false data injection attacks in smart grid cyber-physical systems / / Beibei Li, Rongxing Lu, Gaoxi Xiao
Autore Li Beibei
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XVI, 157 p. 61 illus., 39 illus. in color.)
Disciplina 621.31028558
Collana Wireless Networks
Soggetto topico Smart power grids - Security measures
ISBN 3-030-58672-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Foundations and Related Literature -- SPNTA: Stochastic Petri-Net-Based Reliability Analysis under Topology Attacks -- DHCD: Distributed Host-Based Collaborative Detection for FDI Attacks -- DDOA: Dirichlet-Based Detection for Opportunistic Attacks -- PFDD: On Feasibility and Limitations of Detecting FDI Attacks Using DFACTS -- Conclusion.
Record Nr. UNISA-996465350003316
Li Beibei  
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Emerging information security and applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, proceedings / / edited by Jiageng Chen, Debiao He, and Rongxing Lu
Emerging information security and applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, proceedings / / edited by Jiageng Chen, Debiao He, and Rongxing Lu
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (236 pages)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer networks - Security measures
Data protection
ISBN 3-031-23098-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
Record Nr. UNINA-9910640386003321
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Emerging information security and applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, proceedings / / edited by Jiageng Chen, Debiao He, and Rongxing Lu
Emerging information security and applications : Third International Conference, EISA 2022, Wuhan, China, October 29-30, 2022, proceedings / / edited by Jiageng Chen, Debiao He, and Rongxing Lu
Edizione [1st ed. 2022.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2023]
Descrizione fisica 1 online resource (236 pages)
Disciplina 004.6
Collana Communications in Computer and Information Science
Soggetto topico Computer networks - Security measures
Data protection
ISBN 3-031-23098-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Asymmetric Secure Multi-Party Signing Protocol for the Identity-Based Signature Scheme in the IEEE P1363 Standard for Public Key Cryptography -- A Multi-Task Mobile Crowdsensing Scheme with Conditional Privacy Preserving for Vehicle Networks -- Towards Low-Latency Big Data Infrastructure at Sangfor -- Differential Cryptanalysis of Lightweight Block Ciphers SLIM and LCB -- Parallel Validity Analysis of the Boomerang Attack Model -- A Survey on Discrete Gaussian Samplers in Lattice Based Cryptography -- Hierarchical Identity Based Inner Product Functional Encryption for Privacy Preserving Statistical Analysis without q-type assumption -- AutoRoC-DBSCAN: automatic tuning of DBSCAN to detect malicious DNS tunnels -- HBMD-FL:Heterogeneous Federated Learning Algorithm Based On Blockchain and Model Distillation -- Secure and Efficient Certificateless Authentication Key Agreement Protocol in VANET -- An Efficient Federated Convolutional Neural Network Scheme with Differential Privacy -- D2CDIM:DID-based Decentralized Cross-domain Identity Management with Privacy-Preservation and Sybil-Resistance -- Link Aware Aggregation Query with Privacy-preserving Capability in Wireless Sensor Networks.
Record Nr. UNISA-996508667603316
Cham, Switzerland : , : Springer, , [2023]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Frontiers in Cyber Security : 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers / / edited by Haomiao Yang, Rongxing Lu
Frontiers in Cyber Security : 6th International Conference, FCS 2023, Chengdu, China, August 21–23, 2023, Revised Selected Papers / / edited by Haomiao Yang, Rongxing Lu
Edizione [1st ed. 2024.]
Pubbl/distr/stampa Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Descrizione fisica 1 online resource (XV, 673 p. 174 illus., 143 illus. in color.)
Disciplina 929.605
Collana Communications in Computer and Information Science
Soggetto topico Data protection
Computer engineering
Computer networks
Artificial intelligence
Computer networks - Security measures
Data and Information Security
Computer Engineering and Networks
Artificial Intelligence
Computer Communication Networks
Mobile and Network Security
ISBN 981-9993-31-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain and Distributed Systems -- Secure Cross-chain Transaction for Medical Data Sharing in Blockchain-based Internet of Medical Things -- An blockchain-based proxy re-encryption scheme with cryptographic reverse firewall for IoV -- SCCT-DARS: Secure and Compliant Cryptocurrency Transactions in a Decentralized Anonymous Regulated System -- ODSC: A Unique Chameleon Hash-based Application Framework for Blockchain Smart Contracts -- Cross-chain Identity Authentication for BIoMT with Multi-chain Fusion Mode -- Blockchain-based signature scheme with cryptographic reverse firewalls for IoV -- Network Security and Privacy Protection -- A Hierarchical Asynchronous Federated Learning Privacy-Preserving Framework for IoVs -- A Secure Mutual Authentication Scheme for Wireless Communication -- A Multi-tab Webpage Fingerprinting Method Based on Multi-head Self-attention -- Improving Accuracy of Interactive Queries in Personalized Differential Privacy -- VPSearch+: Achieving Verifiability for Privacy-Preserving Multi-Keyword Search without Client Storage Overhead -- Security-Enhanced Function Privacy Attribute-Based Encryption -- Certificateless Ring Signcryption Scheme with Conditional Privacy Protection in Smart Grid -- Byzantine-robust Privacy-preserving Federated Learning based on DT-PKC -- Updatable and Dynamic Searchable Symmetric Encryption Scheme with Forward and Backward Privacy -- Efficient and Secure Count Queries on Encrypted Genomic Data -- Automatic construction of knowledge graph for personal sensitive data -- Cryptography and Encryption Techniques -- Heterogeneous Aggregate Signature for Unmanned Aerial Vehicles -- Secure arbitrated quantum signature scheme with Bell state -- An Authorized Function Homomorphic Proxy Signature Scheme with Sampling Batch Verification -- ASEV: Anonymous and Scored-Based E-Voting Protocol on Blockchain -- A New Self-Dual-BKZ algorithm based on Lattice Sieving -- A Certificateless Designated Verifier Sanitizable Signature -- An Inner Product Function Encryption Scheme for Secure Distance Calculation -- Efficient Non-Interactive Zero-Knowledge Proof for Graph 3-Coloring Problem -- Cloud-Aided Scalable Revocable IBE with Ciphertext Update from Lattices in the Random Oracle Model -- Heterogeneous Signcryption Scheme With Equality Test for Internet of Vehicles -- An Improved Updatable Signature Scheme with Weakened Token -- A pairing-based certificateless authenticated searchable encryption with MTI guarantees -- Machine Learning and Security -- Anomaly detection method for integrated encrypted malicious traffic based on RFCNN-GRU -- TimeGAN: A Novel Solution to Imbalanced Encrypted Traffic Datasets -- Secure Steganography Scheme based on Steganography Generative Adversarial Network -- SR-GNN: Spectral Residuals with Graph Neural Networks for Anomaly Detection in ADS-B Data -- Learned Pseudo-Random Number Generator based on Generative Adversarial Networks -- An Intrusion Detection System Using Vision Transformer for Representation Learning -- PaBiL-Net: Parallel Bidirectional LSTM Network for Mobile Encrypted Traffic Classification -- A General Source Code Vulnerability Detection Method via Ensemble of Graph Neural Networks -- Federated Long-Tailed Learning by Retraining the Biased Classifier with Prototypes -- Internet of Things and System Security -- Ensuring SLA Compliance of Edge Enabled Cloud Service for IoT application: A Dynamic QoS-aware Scheme -- A Regenerating Code Based Data Restoration Scheme in Active RFID System -- Lightweight Privacy-Preserving Medical Diagnostic Scheme for Internet of Things Healthcare -- Windows Fuzzing Framework Based on Dynamic Tracing And Process Cloning -- Meta-HFMD: A Hierarchical Feature Fusion Malware Detection Framework via Multi-TaskMeta-Learning -- Privacy-Preserving Cloud-Edge Collaborative K-Means Clustering Model in IoT.
Record Nr. UNINA-9910799481203321
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2024
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and Communications Security [[electronic resource] ] : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
Information and Communications Security [[electronic resource] ] : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 818 p. 200 illus., 109 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data structures (Computer science)
Software engineering
Computer organization
Computers
Data Structures and Information Theory
Software Engineering/Programming and Operating Systems
Computer Systems Organization and Communication Networks
Computing Milieux
Information Systems and Communication Service
ISBN 3-030-01950-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management.
Record Nr. UNISA-996466450103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
Information and Communications Security : 20th International Conference, ICICS 2018, Lille, France, October 29-31, 2018, Proceedings / / edited by David Naccache, Shouhuai Xu, Sihan Qing, Pierangela Samarati, Gregory Blanc, Rongxing Lu, Zonghua Zhang, Ahmed Meddahi
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XV, 818 p. 200 illus., 109 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data structures (Computer science)
Software engineering
Computer organization
Computers
Data Structures and Information Theory
Software Engineering/Programming and Operating Systems
Computer Systems Organization and Communication Networks
Computing Milieux
Information Systems and Communication Service
ISBN 3-030-01950-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blockchain technology -- malware -- botnet and network security -- real-world cryptography -- encrypted computing -- privacy protection -- signature schemes -- attack analysis and detection -- searchable encryption and identity-based cryptography -- verifiable storage and computing -- applied cryptography -- supporting techniques -- formal analysis and cryptanalysis -- attack detection -- security management.
Record Nr. UNINA-9910349397203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Querying over Encrypted Data in Smart Grids / / by Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
Querying over Encrypted Data in Smart Grids / / by Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen
Autore Wen Mi
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (85 p.)
Disciplina 005.74
Collana SpringerBriefs in Computer Science
Soggetto topico Data encryption (Computer science)
Electrical engineering
Computer communication systems
Computer security
Cryptology
Communications Engineering, Networks
Computer Communication Networks
Systems and Data Security
ISBN 1-322-03987-9
3-319-06355-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Introduction -- Equality Query for Auction in Emerging Smart Grid Marketing -- Conjunctive Query over Encrypted Multidimensional Data -- Range Query over Encrypted Metering Data for Financial Audit -- Conclusions and Future Work.
Record Nr. UNINA-9910298563303321
Wen Mi  
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and privacy in mobile social networks / / Xiaohui Liang [and four others]
Security and privacy in mobile social networks / / Xiaohui Liang [and four others]
Autore Liang Xiaohui
Edizione [1st ed. 2013.]
Pubbl/distr/stampa New York : , : Springer, , 2013
Descrizione fisica 1 online resource (viii, 100 pages) : illustrations (some color)
Disciplina 004.6
Collana SpringerBriefs in Computer Science
Soggetto topico Computer networks
Computer science
Data protection
Information storage and retrieval systems
Telecommunication
Online social networks - Security measures
Mobile computing - Security measures
ISBN 1-4614-8857-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Overview -- Profile Matching Protocol with Anonymity Enhancing Techniques -- Cooperative Data Forwarding Strategy with Privacy Preservation -- Recommendation-based Trustworthy Service Evaluation.
Record Nr. UNINA-9910437577703321
Liang Xiaohui  
New York : , : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
Security, Privacy, and Anonymity in Computation, Communication, and Storage [[electronic resource] ] : SpaCCS 2019 International Workshops, Atlanta, GA, USA, July 14–17, 2019, Proceedings / / edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XV, 332 p. 127 illus., 97 illus. in color.)
Disciplina 658.478
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Data protection
Computer organization
Computers
Optical data processing
Artificial intelligence
Security
Computer Systems Organization and Communication Networks
Information Systems and Communication Service
Image Processing and Computer Vision
Artificial Intelligence
ISBN 3-030-24900-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The 8th International Symposium on Security and Privacy on Internet of Things (SPIoT 2019) -- Robust Hybrid Lightweight Cryptosystem for Protecting IoT Smart Devices -- A Weighted Risk Score Model for IoT Devices -- Connected Vehicles: A Privacy Analysis -- Privacy-Preserving Big Data Analytics: From Theory to Practice -- The 9th International Symposium on Trust, Security and Privacy for Emerging Applications (TSP 2019) -- A Framework to Identify People in Unstructured Environments Incorporating Biometrics -- Continuous Authentication Using Mouse Clickstream Data Analysis -- Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net -- Cost-Efficient Task Scheduling for Geo-distributed Data Analytics -- Task Scheduling for Streaming Applications in A Cloud-Edge System -- The 5th International Symposium on Sensor-Cloud Systems (SCS 2019) -- Limited Memory Eigenvector Recursive Principal Component Analysis in Sensor-Cloud Based Adaptive Operational Modal Online Identification -- Optimization of Optical Imaging MIMO-OFDM Precoding Matrix -- Data Collection Scheme for Underwater Sensor Cloud System Based on Fog Computing -- A Survey on Fog Computing -- An Approximate Data Collection Algorithm in Space-based Internet of Things -- Outlier Detection of Internet of Vehicles -- Review of Power Spatio-Temporal Big Data Technologies, Applications, and Challenges -- CP-MCNN:Multi-label Chest X-ray Diagnostic based on Con dence Predictor and CNN -- Naive Approach for Bounding Box Annotation and Object Detection towards Smart Retail Systems -- Evaluation of Face Recognition Techniques Based on Symlet 2 Wavelet and Support Vector Machine -- The 11th International Symposium on UbiSafe Computing (UbiSafe 2019) -- An Approach of ACARS Trajectory Reconstruction Based on Adaptive Cubic Spline Interpolation -- Lightweight Distributed Attribute Based Keyword Search System for Internet of Things -- Continuous Objects Detection Based on Optimized Greedy Algorithm in IoT Sensing Networks Distributed Service Recommendation -- The 11th International Workshop on Security in e-Science and e-Research (ISSR 2019) -- Software Quality Assurance: Tools & Techniques -- A Campus Carpooling System Based on GPS Trajectories -- The 2019 International Workshop on Cybersecurity Metrics and Risk Modeling (CMRM 2019) -- Web-based Intelligence for IDS -- Predictably Deterrable? The Case of System Trespassers.
Record Nr. UNISA-996466178903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui