Security Solutions and Applied Cryptography in Smart Grid Communications
Book Citation Index

Security Solutions and Applied Cryptography in Smart Grid Communications

Mohamed Amine Ferrag (Guelma University, Algeria) and Ahmed Ahmim (University of Larbi Tebessi, Algeria)
Indexed In: SCOPUS View 1 More Indices
Release Date: November, 2016|Copyright: © 2017 |Pages: 464
DOI: 10.4018/978-1-5225-1829-7
ISBN13: 9781522518297|ISBN10: 1522518290|EISBN13: 9781522518303
Hardcover:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$193.50
List Price: $215.00
10% Discount:-$21.50
TOTAL SAVINGS: $21.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$260.00
TOTAL SAVINGS: $260.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Electrical energy usage is increasing every year due to population growth and new forms of consumption. As such, it is increasingly imperative to research methods of energy control and safe use.

Security Solutions and Applied Cryptography in Smart Grid Communications is a pivotal reference source for the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive coverage across a range of relevant perspectives and topics, such as threat detection, authentication, and intrusion detection, this book is ideally designed for academicians, researchers, engineers and students seeking current research on ways in which to implement smart grid platforms all over the globe.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Authentication
  • Infrequent Pattern Identification
  • Intrusion Detection System
  • Photovoltaic Systems
  • Renewable Energy
  • Smart Meters
  • Threat Detection
Table of Contents
Search this Book:
Reset
Media
Editor/Author Biographies
Mohamed Amine Ferrag received the Bachelor's degree (June,2008), Master's degree (June,2010) and Ph.D. degree (June,2014) from Badji Mokhtar- Annaba University, Algeria, all in Computer Science. Since October 2014, he is an assistant professor at the Department of Computer Science, Guelma University, Algeria. He is also affiliated as a Researcher member with Networks and Systems Laboratory, Annaba University, Algeria. His research interests include wireless network security, network coding security, and applied cryptography. He is currently serving on various editorial positions like Editorial Board Member in International Journal of Information Security and Privacy (IGI Global) and International Journal of Internet Technology and Secured Transactions (Inderscience Publishers). He has served as an Organizing Committee Member in numerous international conferences like ICNAS'13, ICNAS'15, ASD'16. He has served as TPC Member in ANT'15, IEEE GlobeCom'15, CyberSec'16, IEEE ANTS'16, IEEE ICEMIS'16, etc. Mohamed Amine is member of the IEEE Technical Committee on Security & Privacy, and member of the IEEE Cybersecurity Community. He received some awards for his reviewing activities.
Ahmed Ahmim received the Bachelor’s degree (June, 2007), Master’s degree (June, 2009) and PhD (October, 2014) from Badji Mokhtar-Annaba University, Algeria, all in Computer Science. He has been an Assistant Professor at the Department of Mathematics and Computer Science, University of Larbi Tebessi, Algeria, since May 2015. He is also affiliated as a Researcher member (Since October 2010) with Networks and Systems Laboratory – LRS, Badji Mokhtar – Annaba University, Algeria. His research interests include wireless network security, network coding security, and applied cryptography. He has served as an Organizing Committee Member, and Technical Program Committee (TPC) member in numerous international conferences like ICNAS'13, ICNAS'15, IT4OD’16, PAIS’2016.
Editorial Policy
In order to ensure the highest ethical practices are achieved for each book, IGI Global provides a full document of policies and guidelines that all editors, authors, and reviewers are expected to follow. View Full Editorial Policy
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.