虫虫首页| 资源下载| 资源专辑| 精品软件
登录| 注册

ACEGI-security

  • Physical Layer Security in Wireless Communications

    The ever-increasing demand for private and sensitive data transmission over wireless net- works has made security a crucial concern in the current and future large-scale, dynamic, and heterogeneous wireless communication systems. To address this challenge, computer scientists and engineers have tried hard to continuously come up with improved crypto- graphic algorithms. But typically we do not need to wait too long to find an efficient way to crack these algorithms. With the rapid progress of computational devices, the current cryptographic methods are already becoming more unreliable. In recent years, wireless re- searchers have sought a new security paradigm termed physical layer security. Unlike the traditional cryptographic approach which ignores the effect of the wireless medium, physi- cal layer security exploits the important characteristics of wireless channel, such as fading, interference, and noise, for improving the communication security against eavesdropping attacks. This new security paradigm is expected to complement and significantly increase the overall communication security of future wireless networks.

    标签: Communications Physical Security Wireless Layer in

    上传时间: 2020-05-31

    上传用户:shancjb

  • Dynamic Security

    This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.

    标签: Security Dynamic

    上传时间: 2020-06-07

    上传用户:shancjb

  • Industrial Network Security

    I would like to thank you for purchasing the second edition of “Industrial Network Security,” especially if you are one of the many supporters of the first edition. When the second edition was announced, many people asked me, “why a second edition?” and even more followed that up with, “and why a coauthor?” These ques- tions are harder to answer than you would think.

    标签: Industrial Security Network

    上传时间: 2020-06-07

    上传用户:shancjb

  • Smart Grid Security

    The field of cyber security, or information security, or information assurance, depending on your preference, is an interdisciplinary one. It is part computer science, part statistics, part psychology, part law, and a part of many other fields. Moreover, any cyber security practi- tioner needs to know what he or she is protecting and where to pri- oritize. Just as someone should not spend $100 to protect something worth $10, one cannot be blind to the other disciplines.

    标签: Security Smart Grid

    上传时间: 2020-06-07

    上传用户:shancjb

  • 模拟信号链笔记

    In a world experiencing challenging transitions in multiple arenas—energy, healthcare, industry,finance, and security, to name a few—Maxim Integrated’s Industrial and Medical SolutionsGroup offers superior signal chain solutions that are innovative, accurate, and cost-effective.

    标签: 模拟 信号链

    上传时间: 2013-11-12

    上传用户:fanxiaoqie

  • 远程信息处理数字融合--如何应对新兴标准和协议

    Digital convergence, in recent history, has been prevalentin the consumer equipment domain and the designengineers in this area have been struggling with a plethoraof emerging standards and protocols. What lessons can welearn from their struggle? The same dilemmas now existin in-vehicle telematics and infotainment systems but withthe added issues of extremes of temperature, safety,security, and time in market.

    标签: 远程信息处理 数字 协议 标准

    上传时间: 2014-12-23

    上传用户:9牛10

  • 智能电网安全性

    Abstract: The rapid build out of today's smart grid raises a number of security questions. In this article,we review two recent well-documented security breaches and a report of a security gap. These situationsinclude a 2009 smart-meter hack in Puerto Rico; a 2012 password discovery in grid distributionequipment; and insecure storage of a private key in distribution automation equipment. For each of theseattacks, we examine the breach, the potential threat, and secure silicon methods that, as part of acomplete security strategy, can help thwart the attacks.

    标签: 智能电网 安全性

    上传时间: 2013-10-27

    上传用户:tecman

  • 电能计量和安全性的智能电网

    Abstract: It may sound trite, but it is definitely true: the smart grid has the potential to completely transform the energyindustry. However, smart meters and grid management alone will not ensure the success of the smart grid. Unliketraditional IT networks, smart grids require consideration of energy measurement and security. To completely optimize thistechnology, smart grid designs must focus on energy measurement and security. This tutorial considers the benefits ofboth energy measurement and security and how they make machine-to-machine networks different from traditional IT.

    标签: 电能计量 安全性 智能电网

    上传时间: 2013-10-29

    上传用户:皇族传媒

  • 智能电网安全保护

    Abstract: Stuxnet, a sophisticated virus that damaged Iran's nuclear capability, should be an eye openerfor the world. We can choose to learn something very narrow (how to combat the Stuxnet virus) or wecan choose to focus on the larger goal of thwarting the next type of creative cyber attack. Unfortunately,critical industrial infrastructure is not currently designed with security as a key goal, leaving open multipleavenues for an educated and funded attacker to create massive problems. This tutorial outlines somebasic concepts that engineers and product definers should consider to make sure their new projects stayahead of future threats.

    标签: 智能电网 安全保护

    上传时间: 2013-11-17

    上传用户:llwap

  • 智能电表和智能电网手册

    Abstract: Investment in smart meters and smart grid end equipment continues to grow worldwide as countriestry to make their electric delivery systems more efficient. However, as critical as the electric deliveryinfrastructure is, it is normally not secured and thus subject to attack. This article describes the concept oflife-cycle security—the idea that embedded equipment in the smart grid must have security designed into theentire life of the product, even back to the contract manufacturer. We also talk about how life-cycle securityapplies to embedded equipment in the smart grid. Potential threats are discussed, as are potential solutionsto mitigate the risks posed by those threats.

    标签: 智能电表 智能电网

    上传时间: 2014-12-24

    上传用户:熊少锋