You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid. Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security Examiners Following an overview of the components of the Smart Grid, the book delves into the evolution of security stan...
This book constitutes the refereed proceedings of the Second International Workshop on Self-Organizing Systems, IWSOS 2007. The 17 revised full papers and five revised short papers presented together with two invited talks were carefully selected from more than 36 submissions. The papers are organized in topical sections on ad hoc routing, peer-to-peer networking, network topology, adaptive and self-organizing networks and multicast and mobility protocols.
Presenting the work of prominent researchers working on smart grids and related fields around the world, Security and Privacy in Smart Grids identifies state-of-the-art approaches and novel technologies for smart grid communication and security. It investigates the fundamental aspects and applications of smart grid security and privacy and reports
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.
WithgreatpleasurewewelcomedtheattendeestoEWSN2004,the1stEuropean Workshop on Wireless Sensor Networks, held in the exciting and lively city of Berlin. Wireless sensor networks are a key technology for new ways of interaction betweencomputersandthephysicalenvironmentwhichsurroundsus.Compared to traditional networking technologies, wireless sensor networks are faced with a rather unique mix of challenges: scalability, energy e?ciency, self-con?guration, constrainedcomputationandmemoryresourcesinindividualnodes,data-cent- city, and interaction with the physical environment, to name but a few. The goal of this workshop is to create a forum for presenting new results in the ?ourishing ?eld of wir...
This book constitutes the refereed proceedings of the 6th International Symposium on Security in Computing and Communications, SSCC 2018, held in Bangalore, India, in September 2018. The 34 revised full papers and 12 revised short papers presented were carefully reviewed and selected from 94 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.
The coming of the railways signalled the transformation of European society, allowing the quick and cheap mass transportation of people and goods on a previously unimaginable scale. By the early decades of the twentieth century, however, the domination of rail transport was threatened by increased motorised road transport which would quickly surpass and eclipse the trains, only itself to be challenged in the twenty-first century by a renewal of interest in railways. Yet, as the studies in this volume make clear, to view the relationship between road and rail as a simple competition between two rival forms of transportation, is a mistake. Rail transport did not vanish in the twentieth century...
Ad hoc and sensor networks are making their way from research to real-world deployments. Body and personal-area networks, intelligent homes, environmental monitoring or inter-vehicle communications: there is almost nothing left that is not going to be smart and networked. While a great amount of research has been devoted to the pure networking aspects, ad hoc and sensor networks will not be successfully deployed if security, dependability, and privacy issues are not addressed adequately. As the first book devoted to the topic, this volume constitutes the thoroughly refereed post-proceedings of the First European Workshop on Security in Ad-hoc and Sensor Networks, ESAS, 2004, held in Heidelberg, Germany in August 2004. The 17 revised full papers were carefully reviewed and selected from 55 submissions. Among the key topics addressed are key distribution and management, authentication, energy-aware cryptographic primitives, anonymity and pseudonymity, secure diffusion, secure peer-to-peer overlays, and RFIDs.
For many, smart grids are the biggest technological revolution since the Internet. They have the potential to reduce carbon dioxide emissions, increase the reliability of electricity supply, and increase the efficiency of our energy infrastructure. Smart Grid Applications, Communications, and Security explains how diverse technologies play hand-in-hand in building and maintaining smart grids around the globe. The book delves into the communication aspects of smart grids, provides incredible insight into power electronics, sensing, monitoring, and control technologies, and points out the potential for new technologies and markets. Extensively cross-referenced, the book contains comprehensive ...
This book constitutes the refereed proceedings of the 18th International Conference on Architecture of Computing Systems, ARCS 2005, held in Innsbruck, Austria in March 2005. The 18 revised full papers presented were carefully reviewed and selected from 52 submissions. The papers are organized in topical sections on adaptation, power consumption, and scheduling; adaptation and agents; adaptation and services; application of adaptable systems; and pervasive computing and communication.