—This paper aims to assess the performance of linear state estimation (SE) processes of power systems relying on synchrophasor measurements. The performance assessment is conduct...
Styliani Sarri, Lorenzo Zanni, Miroslav Popovic, J...
— This paper assesses the communication, information and functional requirements of Virtual Power Plants (VPPs). A conceptual formulation of the interoperability requirements is ...
Nicholas Etherden, Valeriy Vyatkin, Math H. J. Bol...
—Random numbers play a key role in applications such as industrial simulations, laboratory experimentation, computer games, and engineering problem solving. The design of new Tru...
Abstract—As it is more and more convenient to manipulate multimedia content, the authenticity of multimedia content becomes questionable. While there are many forensic techniques...
—Spectrum security and enforcement is one of the major challenges that need to be addressed before spectrum sharing technologies can be adopted widely. The problem of rogue trans...
Vireshwar Kumar, Jung-Min "Jerry" Park, Kaigui Bia...
—This paper develops a tractable framework for exploiting the potential benefits of physical layer security in three-tier wireless sensor networks using stochastic geometry. In ...
—Iris recognition has legendary resistance to False Matches, and the tools of information theory can help to explain why. The concept of entropy is fundamental to understanding b...
—Algebraic fault analysis (AFA), which combines algebraic cryptanalysis with fault attacks, has represented serious threats to the security of lightweight block ciphers. Inspired...
Fan Zhang, Shize Guo, Xinjie Zhao, Tao Wang, Jian ...
Abstract—Most current steganographic schemes embed the secret payload by minimizing a heuristically defined distortion. Similarly, their security is evaluated empirically using ...