[Lecture Notes in Electrical Engineering] ISGW 2017: Compendium of Technical Papers Volume 487 || Smart Microgrids: Re-visioning Smart Grid and Smart City ... RK Pillai,G Ghatikar,R Seethapathy,... 被引量: 0发表: 2018年 [Lecture Notes in Electrical Engineering] ISGW 2017: Compendium of Te...
Fries S, Falk R, Sutor A (2013) Smart grid information exchange securing the smart grid from the ground. In: Cuellar J (ed) Smart grid security. Lecture notes in computer science, vol 7823. Springer, Berlin, pp 26–44, url: http://dx..org/10.1007/978-3-642...
The Smart Grid environment allows the integration of resources of small and medium players through the use of Demand Response programs. Despite the clear advantages for the grid, the integration of consumers must be carefully done. This paper proposes a system which simulates small and medium playe...
Methods of energy theft include hacking smart city devices and plugging other households directly into the power grid. Other techniques that include are mechanisms, manipulating data through cloud storage, and tampering with the smart meter's software. Accordingly, attackers can diminish their power ...
The emerging trend in process management and in service oriented applications is to enable the composition of new distributed processes on the basis of user requests, through (parts of) available (and often embedded in the environment) services to be com
Notes [1]Delos, Peter. “The Way to a New Phased Array Radar Architecture.” TechTime: Electronics & Technology News. January 15, 2018. Accessed January 1, 2019.https://techtime.news/2018/01/ 15/analog-devices-phased-array-radar/. “Although there is a lot of discussion of massive MIMO...
* Smart Grid * eGovernment * eMobility * eHealth In addition to general usage of Big Data and semantic technologies, a special focus will be given to using Big Data, Smart Data and semantic technologies to improve the sustainability and energy efficiency of processes and systems. We explicitly...
* Smart Grid * eGovernment * eMobility * eHealth In addition to general usage of Big Data and semantic technologies, a focus on improving the transparency, usability and auditability of processes and systems, is especially encouraged. INTENDED AUDIENCE --- As participants of the workshop, we...
Vincent Poor, BlackIoT: IoT Botnet of High Wattage Devices Can Disrupt the Power Grid, in: Proceedings of the 27th USENIX Security Symposium, USENIX Security'18, USENIX Association, Berkeley, CA, USA, 2018. ISBN 978-1-939133-04-5. [72] Katrin Wolf, Karola Marky and Markus Funk, We ...
All papers much be formatted in Lecture Notes in Computer Science (LNCS) format, and not exceeding 12 pages. The style files are available from Springer LNCS site (http://www.springer.com/computer/lncs?SGWID=0-164-6-793341-0). Please submit your manuscripts in PDF format to the workshop...