| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910983054503321 |
|
|
Autore |
Chen Bo |
|
|
Titolo |
Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks / / by Bo Chen, Tongxiang Li, Wen-An Zhang, Li Yu |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Singapore : , : Springer Nature Singapore : , : Imprint : Springer, , 2025 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed. 2025.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (269 pages) |
|
|
|
|
|
|
Altri autori (Persone) |
|
LiTongxiang |
ZhangWen-An |
YuLi |
|
|
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Telecommunication |
Cooperating objects (Computer systems) |
Computer networks - Security measures |
Communications Engineering, Networks |
Cyber-Physical Systems |
Mobile and Network Security |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Introduction -- Secure dimensionality reduction fusion estimation against eavesdroppers in cpss -- Distributed privacy preserving fusion estimation using homomorphic encryption -- fdi attack detection using fusion estimation methods -- Secure infinity fusion estimation against dual channel fdi attacks based on intermediate variable.-Distributed fusion estimation for nonlinear cpss under attacked control signals -- Networked nonlinear fusion estimation under dos attacks -- Active secure control against dos attacks using predictive control approach -- Security control against time delay attacks using switched system approach -- Adaptive output regulation for cpss under time delay attacks -- Attack resilient control against fdi attacks using sliding mode control. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
The book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy |
|
|
|
|
|
|
|
|
|
|
protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks. The comprehensive and systematic treatment of security protection in cyber-physical systems is one of the main features of the book, which is particularly suitable for readers interested in learning practical solutions for the security of cyber-physical systems. The book can benefit researchers, engineers and graduate students in the fields of control science and engineering, computer science, communication engineering, etc. |
|
|
|
|
|
| |