MARC details
000 -LEADER |
fixed length control field |
02449nam a22002657a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
OSt |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220517012558.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220517b |||||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783030883492 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
21984182 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
0 |
092 ## - LOCALLY ASSIGNED DEWEY CALL NUMBER (OCLC) |
Edition number |
0 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Wu, Chengwei |
245 ## - TITLE STATEMENT |
Title |
Security of cyber-physical systems |
Remainder of title |
state estimation and control |
Statement of responsibility, etc. |
Chengwei Wu, Weiran Yao, Guanghui Sun, Ligang Wu. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cham, Switzerland |
Name of publisher, distributor, etc. |
Springer |
Date of publication, distribution, etc. |
2022 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
277 pages |
Dimensions |
30 cm |
490 ## - SERIES STATEMENT |
Materials specified |
Studies in systems, decision and control |
Volume/sequential designation |
v. 396. |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references (p. 269-277) |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Introduction --<br/>Optimal DoS Attack Scheduling for CPSs --<br/>Active Defense Control of CPSs via Sliding Mode --<br/>Learning Tracking Control for CPSs --<br/>Intelligent Control for Nonlinear Networked Control Systems --<br/>Reliable Filtering of Sensor Networks --<br/>Secure Estimation for CPSs via Sliding Mode --<br/>Zero-Sum Game Based Optimal Secure Control --<br/>Proactive Secure Control for CPSs. Fault-Tolerant Tracking Control for Nonstrict-Feedback Systems --<br/>Deep Reinforcement Learning Control Approach to Mitigating Attacks --<br/>Conclusion and Further Work. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
This book analyzes the secure problems of cyber-physical systems from both the adversary and defender sides. Targeting the challenging security problems of cyber-physical systems under malicious attacks, this book presents some recent novel secure state estimation and control algorithms, in which moving target defense scheme, zero-sum game-theoretical approach, reinforcement learning, neural networks, and intelligent control are adopted. Readers will find not only the valuable secure state estimation and control schemes combined with the approaches aforementioned, but also some vital conclusions for securing cyber-physical systems, for example, the critical value of allowed attack probability, the maximum number of sensors to be attacked, etc. The book also provides practical applications, example of which are unmanned aerial vehicles, interruptible power system, and robot arm to validate the proposed secure algorithms. Given its scope, it offers a valuable resource for undergraduate and graduate students, academics, scientists, and engineers who are working in this field. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Cooperating objects (Computer systems) |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Security measures. |
887 ## - NON-MARC INFORMATION FIELD |
Source of data |
CamTech Library |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Books |
Suppress in OPAC |
No |