04168oam 2200457 450 991048353120332120210710103242.0981-336-730-X10.1007/978-981-33-6730-2(CKB)4100000011763288(DE-He213)978-981-33-6730-2(MiAaPQ)EBC6480203(PPN)25385766X(EXLCZ)99410000001176328820210710d2021 uy 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierSecure control of networked control systems and its applications /Dong Yue, Songlin Hu, Zihao Chen1st ed. 2021.Gateway East, Singapore :Springer,[2021]©20211 online resource (XV, 272 p. 101 illus., 92 illus. in color.) 981-336-729-6 Introduction -- Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks -- Observer-Based Event-Triggered Control for Networked Linear Systems Subject to Denial-of-Service Attacks -- Security Control of Cyber-Physical System Based on Switching Approach for Intermittent Denial-of-Service Jamming Attack -- Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks -- Observer-Based Distributed Secure Consensus Control of a Class of Linear Multi-Agent Systems Subject to Random Attacks -- Security Control of Networked T-S Fuzzy System Under Intermittent DoS Jamming Attack with Event-Based Predictor -- Bandwidth Allocation-Based Switched Dynamic Triggering Control Against DoS Attacks -- Attack-Resilient Event-Triggered Controller Design of DC Microgrids Under DoS Attacks -- Resilient dynamic event-triggered control for multi-area power systems with renewable energy penetration under DoS attacks -- Resilient Load Frequency Control Design: DoS Attacks Against Additional Control Loop -- Secure Distributed Optimal Frequency Regulation of Power Grid with Time-Varying Voltages under Cyberattack.This book shows some secure control methods of networked control systems related to linear control system, nonlinear control system, multi-agent system and its applications in power systems. The proposed secure control methods provide some useful results about modeling of network attacks, resilient analysis and synthesis methods, active defense control method. The contents of this book are lists as followings. (1) Modeling of DoS attacks, deception attacks and replay attacks; (2)Secure control methods are proposed by combing delay system method, switched system method and event-based control method. (3) Active control methods are proposed by using model-predictive control and redundant control. (4) The proposed control methods are applied to the security problem of power system. The methods of this book include DoS attacks modeling such as, periodic jamming attack model,model-based average dwell time model, deception attack modeling and relay attack modeling; piece-wise Lyapunov-Krasoviskii functional method, stochastic control method; the results including resilient conditions of networked control system and related resilient control design method with linear matrix inequalities(LMIs). From this book, readers can learn about the general network attack modeling methods, resilient analysis and synthesis methods, active control methods from viewpoint of redundancy control, and secure conditions of power systems. Some fundamental knowledge prepared to read this book includes delay system theory, event triggered mechanism, T-S fuzzy system theory and frequency/voltage control of power system.Automatic controlAutomatic control.629.8Dong Yue1620-1686,1226307Hu SonglinCheng ZihaoMiAaPQMiAaPQUtOrBLWBOOK9910483531203321Secure control of networked control systems and its applications2850782UNINA