Reference Hub9
Indices2
Security Solutions and Applied Cryptography in Smart Grid Communications

Security Solutions and Applied Cryptography in Smart Grid Communications

Copyright: © 2017 |Pages: 464
ISBN13: 9781522518297|ISBN10: 1522518290|EISBN13: 9781522518303
DOI: 10.4018/978-1-5225-1829-7
Cite Book Cite Book

MLA

Ferrag, Mohamed Amine, and Ahmed Ahmim, editors. Security Solutions and Applied Cryptography in Smart Grid Communications. IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1829-7

APA

Ferrag, M. A. & Ahmim, A. (Eds.). (2017). Security Solutions and Applied Cryptography in Smart Grid Communications. IGI Global. https://doi.org/10.4018/978-1-5225-1829-7

Chicago

Ferrag, Mohamed Amine, and Ahmed Ahmim, eds. Security Solutions and Applied Cryptography in Smart Grid Communications. Hershey, PA: IGI Global, 2017. https://doi.org/10.4018/978-1-5225-1829-7

Export Reference

Mendeley
Favorite Full-Book Download

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use.

Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Advances in Information Security, Privacy, and Ethics (AISPE) Book Series
This content has been removed at the discretion of the publisher and the editors.
Dedication
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board and List of Reviewers
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Vulnerabilities, Threats, and Attacks
This content has been removed at the discretion of the publisher and the editors.
Authentication, Privacy, and Interoperability
This content has been removed at the discretion of the publisher and the editors.
Intrusion Detection Systems and Cryptography Solutions
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Smart Energy and Network Management
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.