Cyber Security for Industrial Control Systems
From the Viewpoint of Close-Loop
Herausgeber: Cheng, Peng; Chen, Jiming; Zhang, Heng
Cyber Security for Industrial Control Systems
From the Viewpoint of Close-Loop
Herausgeber: Cheng, Peng; Chen, Jiming; Zhang, Heng
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
New generation industrial control systems are better able to connect cyber space and the physical process in close-loop than ever before. However, such connections also provide rich opportunities for adversaries to perform potential malicious attacks. Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides
Andere Kunden interessierten sich auch für
Security and Privacy in Smart Grids73,99 €
IoT and AI Technologies for Sustainable Living57,99 €
Magdi S. MahmoudRobust Control and Filtering for Time-Delay Systems84,99 €
Lounis AdouaneAutonomous Vehicle Navigation61,99 €
Dawoud Shenouda DawoudMicrocontroller and Smart Home Networks55,99 €
William S. LevineControl System Applications84,99 €
Metaheuristic Algorithms in Industry 4.055,99 €-
-
-
New generation industrial control systems are better able to connect cyber space and the physical process in close-loop than ever before. However, such connections also provide rich opportunities for adversaries to perform potential malicious attacks. Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides
Produktdetails
- Produktdetails
- Verlag: CRC Press
- Seitenzahl: 315
- Erscheinungstermin: 30. Juni 2020
- Englisch
- Gewicht: 600g
- ISBN-13: 9780367574970
- ISBN-10: 0367574977
- Artikelnr.: 73390386
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: CRC Press
- Seitenzahl: 315
- Erscheinungstermin: 30. Juni 2020
- Englisch
- Gewicht: 600g
- ISBN-13: 9780367574970
- ISBN-10: 0367574977
- Artikelnr.: 73390386
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Peng Cheng earned his BE degree in automation and his PhD degree in control science and engineering from Zhejiang University in 2004 and 2009, respectively. He was a research fellow at the National University of Singapore from 2010 to 2011 and at Singapore University of Technology and Design from 2012 to 2013. Currently, he is a full professor with the Department of Control Science and Engineering at Zhejiang University. He has served as associate editor of Wireless Networks and International Journal of Communication Systems, and as guest editor of IEEE Transactions on Control of Network Systems. His research interests include networked sensing and control, cyber-physical systems, control system security, and robust control theory and applications. Heng Zhang earned his BSc degree in mathematics from Jiangsu Normal University in 2004, his masters degree in mathematics and PhD in control science and engineering from Zhejiang University in 2006 and 2015, respectively. He is a faculty member of Huaihai Institute of Technology, China. He was a visiting student in the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology in fall, 2012. He has served as a guest editor of Peer-to-Peer Networking and Applications. His research interests include security and privacy in cyber-physical systems, networked control systems, and optimization theory. Jiming Chen earned his BSc degree and PhD degree in control science and engineering from Zhejiang University in 2000 and 2005, respectively. He was a visiting researcher at INRIA in 2006, National University of Singapore in 2007, and University of Waterloo from 2008 to 2010. Currently, he is a full professor with the Department of Control Science and Engineering, group coordinator of Networked Sensing and Control, vice director of the State Key Laboratory of Industrial Control Technology, and vice director of the Institute of Industrial Process Control at Zhejiang University, China.
SECURE STATE ESTIMATION. A Game-Theoretic Approach to Jamming Attacks.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.
SECURE STATE ESTIMATION. A Game-Theoretic Approach to Jamming Attacks.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.







