Cyber Security for Industrial Control Systems (eBook, PDF)
From the Viewpoint of Close-Loop
Redaktion: Cheng, Peng; Chen, Jiming; Zhang, Heng
42,95 €
42,95 €
inkl. MwSt.
Sofort per Download lieferbar
21 °P sammeln
42,95 €
Als Download kaufen
42,95 €
inkl. MwSt.
Sofort per Download lieferbar
21 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
42,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
21 °P sammeln
Cyber Security for Industrial Control Systems (eBook, PDF)
From the Viewpoint of Close-Loop
Redaktion: Cheng, Peng; Chen, Jiming; Zhang, Heng
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts.The
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 4.82MB
Andere Kunden interessierten sich auch für
- Radu DobrescuLarge Scale Networks (eBook, PDF)73,95 €
- Kun PengAnonymous Communication Networks (eBook, PDF)59,95 €
- Edwin Lyle Brown802.1X Port-Based Authentication (eBook, PDF)59,95 €
- Handbook on Theoretical and Algorithmic Aspects of Sensor, Ad Hoc Wireless, and Peer-to-Peer Networks (eBook, PDF)59,95 €
- Deedee M. Bennett GayleEmpowered or Left Behind (eBook, PDF)45,95 €
- Model-Based Testing for Embedded Systems (eBook, PDF)80,95 €
- Gilbert HeldWindows Networking Tools (eBook, PDF)57,95 €
-
-
-
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts.The
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 325
- Erscheinungstermin: 23. März 2016
- Englisch
- ISBN-13: 9781498734745
- Artikelnr.: 44874439
- Verlag: Taylor & Francis eBooks
- Seitenzahl: 325
- Erscheinungstermin: 23. März 2016
- Englisch
- ISBN-13: 9781498734745
- Artikelnr.: 44874439
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Peng Cheng earned his BE degree in automation and his PhD degree in control science and engineering from Zhejiang University in 2004 and 2009, respectively. He was a research fellow at the National University of Singapore from 2010 to 2011 and at Singapore University of Technology and Design from 2012 to 2013. Currently, he is a full professor with the Department of Control Science and Engineering at Zhejiang University. He has served as associate editor of Wireless Networks and International Journal of Communication Systems, and as guest editor of IEEE Transactions on Control of Network Systems. His research interests include networked sensing and control, cyber-physical systems, control system security, and robust control theory and applications. Heng Zhang earned his BSc degree in mathematics from Jiangsu Normal University in 2004, his masters degree in mathematics and PhD in control science and engineering from Zhejiang University in 2006 and 2015, respectively. He is a faculty member of Huaihai Institute of Technology, China. He was a visiting student in the Department of Electronic and Computer Engineering, Hong Kong University of Science and Technology in fall, 2012. He has served as a guest editor of Peer-to-Peer Networking and Applications. His research interests include security and privacy in cyber-physical systems, networked control systems, and optimization theory. Jiming Chen earned his BSc degree and PhD degree in control science and engineering from Zhejiang University in 2000 and 2005, respectively. He was a visiting researcher at INRIA in 2006, National University of Singapore in 2007, and University of Waterloo from 2008 to 2010. Currently, he is a full professor with the Department of Control Science and Engineering, group coordinator of Networked Sensing and Control, vice director of the State Key Laboratory of Industrial Control Technology, and vice director of the Institute of Industrial Process Control at Zhejiang University, China.
SECURE STATE ESTIMATION. A Game-Theoretic Approach to Jamming Attacks.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.
SECURE STATE ESTIMATION. A Game-Theoretic Approach to Jamming Attacks.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.
Secure State Estimation against Stealthy Attack. Secure State Estimation in
Industrial Control Systems. RESILIENT CONTROL THEORY. Best DoS Attack
Policy against Wireless Systems. Specification-Based FDI Detection
Technique. Resilient Control System Hierarchical Architectures. Topology
Control in Secure WSNs. Resilient Distributed Control in Energy CPSs.
SECURITY ISSUES IN APPLICATION FIELDS. Resilient Control of
Operator-Vehicle Networks. Privacy-Preserving Data Access Control.