Mostrando 42,141 - 42,160 Resultados de 51,016 Para Buscar 'Nontron~', tiempo de consulta: 1.56s Limitar resultados
  1. 42141
    por Shah, Imdad Ali
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Acknowledgements -- Chapter 1 Cybersecurity Issues and Challenges in Civil Aviation Security -- 1.1 Introduction -- 1.2 Literature Review -- 1.3 Research Methods -- 1.4 Cyber Risk in Aviation -- 1.4.1 Voice (Very High Frequency - VHF) -- 1.4.2 Automatic Dependent Surveillance-Broadcast (ADS-B) -- 1.4.3 Importance of Satellite Navigation (GPS) -- 1.5 Distributed Denial of Service (DDoS) -- 1.5.1 Impact of DDoS on Air Transportation -- 1.6 Discussion -- 1.6.1 Importance of IoT in Civil Aviation -- 1.6.2 Cybersecurity Challenges in Civil Aviation -- 1.7 Conclusion -- 1.8 Future Work -- References -- Chapter 2 Addressing Security Issues and Challenges in Smart Logistics Using Smart Technologies -- 2.1 Introduction -- 2.2 Literature Review -- 2.3 Methodology -- 2.4 Evaluation of Logistics and Smart Technologies -- 2.4.1 Connectivity -- 2.4.2 Sensors Collection -- 2.4.3 Data Processing Analysis -- 2.4.4 Automation and Control -- 2.4.5 Remote Monitoring and Management -- 2.5 Transportation Technology's Types -- 2.5.1 Underground Tunneling -- 2.5.2 Aerospace -- 2.5.3 Autonomous Vehicles -- 2.5.4 Last-Mile Robots -- 2.5.5 Electric Vehicles -- 2.6 Transportation Technology in Development -- 2.6.1 Blockchain Technology -- 2.6.2 Autonomous Vehicles -- 2.6.3 Connected Vehicles -- 2.7 Discussion -- 2.8 Conclusion -- 2.9 Future Work -- References -- Chapter 3 Global Navigation Satellite Systems for Logistics: Cybersecurity Issues and Challenges -- 3.1 Introduction -- 3.2 Literature Review -- 3.3 Research Methods -- 3.4 Global Navigation Satellite Systems -- 3.4.1 Types of Global Navigation Satellite Systems -- 3.4.2 Global Positioning System (United States) -- 3.4.3 GLONASS (Russia) -- 3.4.4 Galileo (European Union) -- 3.4.5 BeiDou (China) -- 3.4.6 IRNSS (India)…”
    Libro electrónico
  2. 42142
    Publicado 1994
    Tabla de Contenidos: “…D Centers -- Centers for Disease Control and Prevention -- Agency for Health Care Policy and Research -- U.S. …”
    Libro electrónico
  3. 42143
    por Rao , K. Rama Mohana
    Publicado 2011
    Tabla de Contenidos: “…Corporate Strategy and Social Responsibility -- Strategy Evaluation and Control -- Summary -- Key Terms -- Brief Questions -- Essay Questions -- Assignments -- References -- Chapter 8: Market Segmentation -- Introduction -- Undifferentiated Marketing -- Differentiated Marketing (Market Segmentation) -- Bases for Market Segmentation -- Consumer Characteristics -- Consumer Responses (Behavioural Segmentation) -- Technographic Segmentation -- Market Segmentation System -- Criteria for Market Segmentation -- Substantiality -- Measurability -- Accessibility -- Differentiability -- Customization -- Customizing the Service Around a Standardized Core -- Creating Customizable Services -- Offering Point-of-delivery Customization -- Offering Standard Modules that Can Be Combinedin Unique Ways -- Stages in Market Segmentation -- Search -- Selection -- Strategy -- Summary -- Key Terms -- Brief Questions -- Essay Questions -- Assignments -- References -- Chapter 9: Competition Analysis and Strategies -- Introduction -- Competitive Threats -- Competition from the Industry Perspective -- Monopoly -- Oligopoly -- Monopolistic Competition -- Pure Competition -- Competition from the Market Perspective -- Competition Leads Life Insurance Market Development in India -- Competition Analysis -- Future Objectives -- Current Strategy -- Assumption -- Capabilities -- Competition Strategies -- Market Leaders -- Market Challengers -- Market Followers -- Market Nichers -- Achieving Competitive Advantage -- Regulated Competition in the Indian Telecom Sector -- Summary -- Key Terms -- Brief Questions -- Essay Questions -- Assignments -- References -- Chapter 10: Service Demand Management -- Introduction -- Demand Situations -- Negative Demand -- No Demand -- Latent Demand -- Seasonal Demand -- Demand Patterns -- Irregular Demand -- Falling Demand…”
    Libro electrónico
  4. 42144
    por Mishra, Jibitesh
    Publicado 2011
    Tabla de Contenidos: “…14.4 CLASSIFICATION OF SOFTWARE PROJECTS -- 14.5 CONSTRUCTIVE COST ESTIMATION MODEL -- 14.6 COCOMO II -- 14.7 CONCLUSION -- SUMMARY -- EXCERCISES -- Ch.15: Software Project Management -- 15.1 INTRODUCTION TO SOFTWARE PROJECT MANAGEMENT -- 15.2 PROJECT PLANNING -- 15.3 WORK BREAKDOWN STRUCTURE -- 15.4 PROJECT SCHEDULING -- 15.5 EXECUTION, MONITORING AND CONTROL -- 15.6 RISK MANAGEMENT -- 15.7 CONFIGURATION MANAGEMENT -- SUMMARY -- EXERCISES -- Ch.16: Software Quality Management -- 16.1 THE CONCEPT OF QUALITY -- 16.2 EVOLUTION OF QUALITY MANAGEMENT -- 16.3 SOME THOUGHTS OF QUALITY GURUS -- 16.4 PROCESS QUALITY MODELS -- 16.5 QUALITY ASSURANCE -- 16.6 PROCESS IMPROVEMENT AND SIX SIGMA -- 16.7 PROCESS STANDARD: ISO 9000 -- 16.8 PROCESS STANDARD: ISO 12207 -- 16.9 CAPABILITY MATURITY MODEL -- SUMMARY -- EXERCISES -- Ch.17: Web Engineering -- 17.1 GENERAL WEB CHARACTERISTICS -- 17.2 WEB ENGINEERING PROCESS -- 17.3 WEB DESIGN PRINCIPLES -- 17.4 WEB METRICS -- 17.5 MOBILE WEB ENGINEERING -- 17.6 WEB ENGINEERING SECURITY -- SUMMARY -- EXCERCISES -- Appendix A: Objective-type Questions -- MODULE - I -- MODULE - II -- MODULE - III -- MODULE - IV -- ANSWERS -- Appendix B: Frequently Asked Questions with Short Answers -- MODULE - I -- MODULE - II -- MODULE - III -- MODULE - IV -- Appendix C: Software Maintenance -- C.1 NEED FOR SOFTWARE MAINTENANCE -- C.2 TYPES OF SOFTWARE MAINTENANCE -- C.3 MAINTENANCE PROCESS MODELS -- C.4 SOFTWARE REVERSE ENGINEERING -- C.5 SOFTWARE REENGINEERING -- C.6 PROBLEMS OF SOFTWARE MAINTENANCE -- C.7 SUCCESS FACTORS OF SOFTWARE MAINTENANCE -- Appendix D: Component-based Software Engineering -- D.1 WHAT IS A SOFTWARE COMPONENT? …”
    Libro electrónico
  5. 42145
    Publicado 2021
    Tabla de Contenidos: “…Interacción entre actividad física y control del apetito: implicaciones para el balance energético / K. …”
    Libro
  6. 42146
  7. 42147
    por Zafra, Julián
    Publicado 2018
    Tabla de Contenidos: “….) -- 14.6 FOLEY -- 14.7 SONIDO 3D -- 14.8 AMBISIONICS -- 15 EL ESTUDIO DE GRABACIÓN -- 15.1 EN EL ESTUDIO -- 15.1.1 LA SALA DE GRABACIÓN -- 15.1.2 EL CONTROL ROOM (SALA DE CONTROL) -- 15.2 PERSONAL HUMANO QUE INTERVIENE EN (...) -- 15.2.1 LOS MÚSICOS -- 15.2.2 LOS MÚSICOS DE ESTUDIO O SESIÓN -- 15.2.3 EL PRODUCTOR -- 15.2.4 EL INGENIERO -- 15.2.5 EL ASISTENTE -- 16 PREPARACIÓN DE UNA SESIÓN DE GRABACIÓN -- 16.1 PREPRODUCCIÓN -- 16.2 LA ELECCIÓN DE LA MICROFONÍA -- 16.3 POSICIONAMIENTO DE LA MICROFONÍA (SWEET (...) -- 16.4 MEZCLA DE AURICULARES (FOLDBACK MIX) -- 17 ALGUNOS DE LOS PRINCIPALES ESTUDIOS (...) -- 17.1 HISTORIA Y ORÍGENES DE LA INDUSTRIA (...)…”
    Libro electrónico
  8. 42148
    Publicado 2020
    Tabla de Contenidos: “….) -- SEMBLANZA BIOGRFICA Y ESPRITU DE LA POCA -- INSTRUMENTOS DE CONTROL MATEMTICO -- DIFICULTADES Y ANTICIPACIONES -- ACTIVACIN RETINIANA -- GRAMTICAS DEL COLOR Y SUS CONSECUENCIAS -- HELMHOLTZ VS. …”
    Libro electrónico
  9. 42149
    Tabla de Contenidos: “….- Administraciones Públicas y control de legalidad de la actuación administrativa -- 3o.- Otras pretensiones conocidas por los órganos jurisdiccionales contencioso-administrativos -- Artículo 2. …”
    Libro electrónico
  10. 42150
    Publicado 2020
    Tabla de Contenidos: “…CHAPTER 7 Nonlinear, Semiparametric, and Nonparametric Regression Models -- 7.1 Introduction -- 7.2 Nonlinear Regression Models -- 7.2.1 Assumptions of the Nonlinear Regression Model -- 7.2.2 The Nonlinear Least Squares Estimator -- 7.2.3 Large-Sample Properties of the Nonlinear Least Squares Estimator -- 7.2.4 Robust Covariance Matrix Estimation -- 7.2.5 Hypothesis Testing and Parametric Restrictions -- 7.2.6 Applications -- 7.2.7 Loglinear Models -- 7.2.8 Computing the Nonlinear Least Squares Estimator -- 7.3 Median and Quantile Regression -- 7.3.1 Least Absolute Deviations Estimation -- 7.3.2 Quantile Regression Models -- 7.4 Partially Linear Regression -- 7.5 Nonparametric Regression -- 7.6 Summary and Conclusions -- CHAPTER 8 Endogeneity and Instrumental Variable Estimation -- 8.1 Introduction -- 8.2 Assumptions of the Extended Model -- 8.3 Instrumental Variables Estimation -- 8.3.1 Least Squares -- 8.3.2 The Instrumental Variables Estimator -- 8.3.3 Estimating the Asymptotic Covariance Matrix -- 8.3.4 Motivating the Instrumental Variables Estimator -- 8.4 Two-Stage Least Squares, Control Functions, and Limited Information Maximum Likelihood -- 8.4.1 Two-Stage Least Squares -- 8.4.2 A Control Function Approach -- 8.4.3 Limited Information Maximum Likelihood -- 8.5 Endogenous Dummy Variables: Estimating Treatment Effects -- 8.5.1 Regression Analysis of Treatment Effects -- 8.5.2 Instrumental Variables -- 8.5.3 A Control Function Estimator -- 8.5.4 Propensity Score Matching -- 8.6 Hypothesis Tests -- 8.6.1 Testing Restrictions -- 8.6.2 Specification Tests -- 8.6.3 Testing for Endogeneity: The Hausman and Wu Specification Tests -- 8.6.4 A Test for Overidentification -- 8.7 Weak Instruments and LIML -- 8.8 Measurement Error -- 8.8.1 Least Squares Attenuation -- 8.8.2 Instrumental Variables Estimation -- 8.8.3 Proxy Variables…”
    Libro electrónico
  11. 42151
    Publicado 2022
    Tabla de Contenidos: “…-- 3.6 Summary -- 3.7 Exercises -- 4 Principles in action -- 4.1 Buffer validation of application device channels -- 4.2 Scheduler for asynchronous transfer mode flow control -- 4.3 Route computation using Dijkstra's algorithm -- 4.4 Ethernet monitor using bridge hardware -- 4.5 Demultiplexing in the x-kernel -- 4.6 Tries with node compression -- 4.7 Packet filtering in routers -- 4.8 Avoiding fragmentation of LSPs…”
    Libro electrónico
  12. 42152
    Tabla de Contenidos: “…Abus de position dominante et sanctions -- Recommandation de réforme -- 6.2.5. Contrôle des fusions…”
    Libro electrónico
  13. 42153
    por OECD
    Publicado 2018
    Tabla de Contenidos: “…-- Préciser les profils des travailleurs étrangers : antécédents et parcours -- Les facteurs qui favorisent l'emploi illégal des étrangers -- L'emploi illégal des étrangers dans les pays de l'OCDE -- Problèmes d'évaluation -- Population immigrée en situation d'irrégularité, personnes en dépassement de séjour et arrestations : ampleur et évolutions -- Ampleur -- Informations partielles sur les tendances -- Emploi illégal des étrangers : caractéristiques des travailleurs et secteurs d'activité -- Caractéristiques des travailleurs : sexe, âge, qualifications et pays d'origine -- Secteurs et professions -- Pour un panorama complet de l'emploi illégal des étrangers : étude de cas en Italie -- Analyse des résultats de l'enquête menée en Lombardie -- Données relatives à l'intégration -- Combattre l'emploi illégal des étrangers -- Réduire l'emploi informel -- Mettre un frein à l'immigration irrégulière -- Contrôle aux frontières et détection dans les pays -- Création de filières d'immigration légale dans certains secteurs -- Programmes de régularisation -- Améliorer la conformité aux règlements et leur contrôle sur le lieu de travail : prévention, détection et sanction -- Sensibilisation -- Encourager le recours aux systèmes de vérification du statut légal des travailleurs -- Assurer des inspections efficaces et adéquates -- Renforcer l'efficacité des sanctions à l'encontre des employeurs -- Conclusions -- Notes -- Références -- Annexe 4.A. …”
    Libro electrónico
  14. 42154
    Publicado 2023
    Tabla de Contenidos: “…Transactional data processing -- 10 Managing data -- 10.1 The persistence lifecycle -- 10.1.1 Entity instance states -- 10.1.2 The persistence context -- 10.2 The EntityManager interface -- 10.2.1 The canonical unit of work -- 10.2.2 Making data persistent -- 10.2.3 Retrieving and modifying persistent data -- 10.2.4 Getting a reference -- 10.2.5 Making data transient -- 10.2.6 Refreshing data -- 10.2.7 Replicating data -- 10.2.8 Caching in the persistence context -- 10.2.9 Flushing the persistence context -- 10.3 Working with detached state -- 10.3.1 The identity of detached instances -- 10.3.2 Implementing equality methods -- 10.3.3 Detaching entity instances -- 10.3.4 Merging entity instances -- Summary -- 11 Transactions and concurrency -- 11.1 Transaction essentials -- 11.1.1 ACID attributes -- 11.1.2 Database and system transactions -- 11.2 Controlling concurrent access -- 11.2.1 Understanding database-level concurrency -- 11.2.2 Optimistic concurrency control -- 11.2.3 Explicit pessimistic locking -- 11.2.4 Avoiding deadlocks -- 11.3 Non-transactional data access -- 11.3.1 Reading data in auto-commit mode -- 11.3.2 Queuing modifications -- 11.4 Managing transactions with Spring and Spring Data -- 11.4.1 Transaction propagation -- 11.4.2 Transaction rollback -- 11.4.3 Transaction properties -- 11.4.4 Programmatic transaction definition -- 11.4.5 Transactional development with Spring and Spring Data -- Summary -- 12 Fetch plans, strategies, and profiles -- 12.1 Lazy and eager loading -- 12.1.1 Understanding entity proxies -- 12.1.2 Lazy persistent collections -- 12.1.3 Eager loading of associations and collections -- 12.2 Selecting a fetch strategy -- 12.2.1 The n+1 selects problem -- 12.2.2 The Cartesian product problem -- 12.2.3 Prefetching data in batches -- 12.2.4 Prefetching collections with subselects…”
    Libro electrónico
  15. 42155
    Tabla de Contenidos: “…Politique et législation en matière d'environnement -- Partie I. CONTRÔLE DE LA POLLUTION ET PROTECTION DE LA NATURE -- 2. …”
    Libro electrónico
  16. 42156
    Tabla de Contenidos: “…... elle revient sur le contrôle des prix en interdisant la fixation concertée des prix... -- ... et en empêchant le pouvoir de marché grâce au contrôle des fusions et des restructurations -- Mais la loi ne s'attaque pas directement aux monopoles -- Les réseaux en situation de monopole sont normalement soumis àune réglementation sectorielle -- En principe, la politique de la concurrence s'applique de manière quasi universelle... -- ... mais certains grands secteurs restent des monopoles protégés par l'État -- En principe, la politique de la concurrence s'articule bien avec l'autorité chargée de la réglementation... -- mais dans la pratique, les autorités chargées de la réglementation peuvent opposer une résistance... -- La nouvelle agence chargée de faire appliquer la politique de la concurrence est indépendante... -- ... mais ses actions sont souvent retardées par des recours devant les tribunaux -- La législation et la politique en matière de concurrence sont modernes et très élaborées -- il faut maintenant... -- Chapitre 4. …”
    Libro electrónico
  17. 42157
    Publicado 2019
    Tabla de Contenidos: “…6.8 Challenges Faced by Blockchain Technology -- 6.9 The Future of Blockchain Technology -- 6.10 Conclusion -- References -- 7 Cyber-Security Techniques in Distributed Systems, SLAs and other Cyber Regulations -- 7.1 Introduction -- 7.1.1 Primary Characteristics of a Distributed System -- 7.1.2 Major Challenges for Distributed Systems -- 7.2 Identifying Cyber Requirements -- 7.3 Popular security mechanisms in Distributed Systems -- 7.3.1 Secure Communication -- 7.3.1.1 Authentication -- 7.3.1.2 Shared Keys Authorship-Based Authentication -- 7.3.1.3 Key Distribution Center-Based Authentication -- 7.3.1.4 Public key encryption based authentication -- 7.3.2 Message Integrity and Confidentiality -- 7.3.2.1 Digital Signatures -- 7.3.2.2 Session Keys -- 7.3.3 Access Controls -- 7.3.3.1 Access Control Matrix -- 7.3.3.2 Protection Domains -- 7.3.3.3 Trusted Code -- 7.3.3.4 Denial of Service -- 7.4 Service Level Agreements -- 7.4.1 Types of SLAs -- 7.4.2 Critical Areas for SLAs -- 7.4.2.1 Examining the Network -- 7.4.2.2 Forensics -- 7.4.2.3 Managing Records/Documents -- 7.4.2.4 Backing Up Data -- 7.5 The Cuckoo's Egg in the Context of IT Security -- 7.6 Searching and Seizing Computer-Related Evidence -- 7.6.1 Computerized Search Warrants -- 7.6.1.1 Particularity -- 7.6.1.2 Reasonable Time Period for Examining Seized Electronic Equipment -- 7.6.1.3 Irrational Retention of Seized Data -- 7.6.2 Searching and Seizing -- 7.7 Conclusion -- References -- 8 Distributed Computing Security: Issues and Challenges -- 8.1 Introduction -- 8.2 Security Issues and Challenges -- 8.2.1 Confidentiality, Integrity and Availability -- 8.2.2 Authentication and Access Control Issue -- 8.2.3 Broken Authentication, Session and Access -- 8.3 Security Issues and Challenges in Advanced Areas -- 8.4 Conclusion -- References…”
    Libro electrónico
  18. 42158
    por Bijalwan, Anchit
    Publicado 2024
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Part 1: Emerging Research in Next Generation Computing Like Cloud Computing, Cybersecurity, and Gaming -- Chapter 1 Deploying Virtual Desktop Infrastructure with Open-Source Platform for Higher Education -- 1.1 Introduction -- 1.2 Background -- 1.2.1 Cloud Computing -- 1.2.2 Virtualization -- 1.3 VDI Deployment Using CloudStack as a Private Cloud -- 1.4 Deploy at Information Technology Laboratories -- 1.5 Conclusion -- References -- Chapter 2 Enhancing Intrusion Detection Effectiveness Through an Enhanced Hierarchical Communication Architecture -- 2.1 Introduction -- 2.2 Related Works -- 2.3 Proposed Model -- 2.4 Analysis -- 2.5 Conclusion -- References -- Chapter 3 Enhanced SDN Security Using Mobile Agent -- 3.1 Introduction -- 3.1.1 Introduction to SDN -- 3.1.2 SDN Compared to Conventional Networking -- 3.2 Network Security in SDN -- 3.2.1 Vulnerabilities in SDN -- 3.2.2 Threats on SDN -- 3.3 Enhanced SDN Network Security Using Mobile Agent -- 3.3.1 Cloud Network Management Mobile Agent (CNMMA) Architecture Model -- 3.3.2 Mobile Agent Platform (MAP) -- 3.3.3 Network Management Mobile Agent -- 3.3.4 Mobile Agent Distributed Intrusion Detection System Framework (MA-DIDS) -- 3.3.4.1 IDS-Control Center -- 3.3.4.2 Mobile Agent SDN Control App -- 3.3.5 SDN Network Simulator -- 3.4 Conclusions -- References -- Chapter 4 Understanding the Impact and Implications of Emagnet and Pastebin in Cybersecurity -- 4.1 Introduction -- 4.1.1 Background of Emagnet and Pastebin -- 4.1.2 Importance of the Research -- 4.1.2.1 Research Questions -- 4.2 Literature Review -- 4.2.1 Evolution of Pastebin as a Platform for Hacker Exploits -- 4.2.1.1 Emagnet's Capabilities and Functionalities -- 4.3 Leaked Databases -- 4.4 Methodology -- 4.4.1 Emagnet -- 4.4.2 Key Features and Known Issues…”
    Libro electrónico
  19. 42159
    Publicado 2024
    Tabla de Contenidos: “…JavaScript analysis -- Specialized web technology fingerprinting libraries -- Proactive web security measures with Python -- Input validation and data sanitization -- Secure authentication and authorization -- Secure session management -- Secure coding practices -- Implementing security headers -- Summary -- Chapter 4: Exploiting Web Vulnerabilities Using Python -- Web application vulnerabilities - an overview -- SQL injection -- XSS -- IDOR -- A case study concerning web application security -- SQL injection attacks and Python exploitation -- Features of SQLMap -- How SQLMap works -- Basic usage of SQLMap -- Intercepting with MITMProxy -- XSS exploitation with Python -- Understanding how XSS works -- Reflected XSS (non-persistent) -- Stored XSS (persistent) -- Python for data breaches and privacy exploitation -- XPath -- CSS Selectors -- Summary -- Chapter 5: Cloud Espionage - Python for Cloud Offensive Security -- Cloud security fundamentals -- Shared Responsibility Model -- Cloud deployment models and security implications -- Encryption, access controls, and IdM -- Security measures offered by major cloud providers -- Access control in cloud environments -- Impact of malicious activities -- Python-based cloud data extraction and analysis -- Risks of hardcoded sensitive data and detecting hardcoded access keys -- Enumerating EC2 instances using Python (boto3) -- Exploiting misconfigurations in cloud environments -- Types of misconfigurations -- Identifying misconfigurations -- Exploring Prowler's functionality -- Enhancing security, Python in serverless, and infrastructure as code (IaC) -- Introducing serverless computing -- Introduction to IaC -- Summary -- Part 3: Python Automation for Advanced Security Tasks -- Chapter 6: Building Automated Security Pipelines with Python Using Third-Party Tools…”
    Libro electrónico
  20. 42160
    por Sagar, Shrddha
    Publicado 2025
    Tabla de Contenidos: “…Cover -- Series Page -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 Cyber-Physical Systems: A Control and Energy Approach -- 1.1 Introduction -- 1.1.1 Background and Motivation -- 1.1.2 Testbeds, Revisions, and a Safety Study for Cyber-Physical Energy Systems -- 1.1.3 CPES Test Chamber -- 1.1.4 Significance and Contributions of Testbed -- 1.1.5 Testbed Setup -- 1.1.6 Illustration of Hybrid CPES Testbed Structure -- 1.2 Studies on CPES Safety -- 1.2.1 Attacks in the CPES System -- 1.2.2 Evaluation of Attack Impacts on CPES -- 1.2.3 CPES's Assault Detection Algorithms -- 1.2.4 CPES's Assault Mitigation and Defense Systems -- 1.2.5 Dangerous Imagery -- 1.2.6 Attack Database -- 1.3 Threat Evaluation -- 1.4 Theory of Cyber-Physical Systems Risk -- 1.4.1 Challenger Type -- 1.4.2 Attack Type -- 1.5 Threat Evaluation Methodology -- 1.5.1 Cyber-System Layer -- 1.5.2 Physical-System Layer -- 1.6 Experimental Setup for Cross-Layer Firmware Threats -- 1.6.1 Risk Model -- 1.6.2 Threat Evaluation -- 1.7 Conclusion -- References -- Chapter 2 Optimization Techniques for Energy Management in Microgrid -- 2.1 Introduction -- 2.1.1 Microgrid Systems -- 2.1.2 Energy Management System -- 2.1.3 Energy Management of Distribution System -- 2.1.4 Techniques to Take Into Account While Implementing the EMS -- 2.1.5 Strategies for Reducing Risk -- 2.1.6 Monitoring Power Systems -- 2.1.7 Demand Response, Price Strategy, and Demand Side Management -- 2.2 Explanation Methods for EMS -- 2.3 EQN EMS on an Arithmetic Optimization Basis -- 2.4 Heuristic-Oriented Methods to EMS Problem-Solving -- 2.5 EMS Solution Techniques Using Meta-Heuristics -- 2.6 Alternative EMS Implementation Strategies -- 2.6.1 SCADA System -- 2.7 Conclusion and Viewpoints -- References -- Chapter 3 Cyber-Physical Energy Systems for Smart Grid: Reliable Distribution -- 3.1 Introduction…”
    Libro electrónico