Linked e-resources

Details

Intro; Preface; Contents; Contributors; Fixed Point Theorems in Generalized b-Metric Spaces; Introduction and Preliminaries; Linear Quasi-Contractions; Nonlinear Contractions; References; Orlicz Dual Brunn-Minkowski Theory: Addition, Dual Quermassintegrals and Inequalities; Introduction; Preliminaries; Mixed p-Quermassintegrals of Convex Bodies; Dual Mixed Quermassintegrals; Dual Mixed p-Quermassintegrals; Dual Mixed Harmonic p-Quermassintegrals; Orlicz Radial Harmonic Addition; Orlicz Dual Mixed Quermassintegral; Orlicz Dual Minkowski Inequality; Orlicz Dual Brunn-Minkowski Inequality.

Dual Log-Minkowski InequalityReferences; Modeling Cyber-Security; Introduction; Mathematical Definition of Cyberspace; Mathematical Description of Cyber-Attacks; Valuations and Vulnerabilities of Parts of a Node Constituent; Cyber-Effects and Cyber-Interactions; Description of Cyber Navigations and Protection from Unplanned Attacks; Cyber Navigations; Inadequacy of Cyber Nodes; Infected Cyber Nodes; Dangerous Navigations; Protection of Cyber Nodes from Unplanned Attacks; Description of Various Types of Cyber-Attacks and Protection; Passive Cyber-Attacks.

Protected Cyber Nodes from Passive AttacksActive Cyber-Attacks; Protected Cyber Nodes from Active Attacks; References; Solutions of Hard Knapsack Problems Using Extreme Pruning; Introduction; Lattices; Lenstra-Lenstra-Lovsz Algorithm (LLL); Gram-Schmidt Orthogonalization (GSO); LLL-Pseudocode; Analysis of LLL; Blockwise Korkine-Zolotarev (BKZ); The Enumeration Subroutine; Extreme Pruning; Attacks to Subset Sum Problem; Birthday Attacks; Lattice Attacks; Experiments; Conclusions; Appendix; References; A Computational Intelligence System Identifying Cyber-Attacks on Smart Energy Grids.

IntroductionSmart Energy Grids; Conceptual Framework; Conceptual Model; Cybersecurity for Smart Grid Systems; A New, Smart Era for the Energy Grids; Risks Involved; Threats; Types of Attacks; Cyber Attacks on Smart Grid; SCADA Systems; Methods of Attack; Literature Review; Power System Attack Datasets; SCADA Power System Architecture; Types of Scenarios; The Final Dataset; Methodology and Techniques; Extreme Learning Machines; Adaptive Elitist Differential Evolution (AEDE); Adaptive Elitist Differential Evolution ELM (AEDE-ELM); Results and Comparative Analysis; Discussion: Conclusions.

Browse Subjects

Show more subjects...

Statistics

from
to
Export