LEADER 04168oam 2200457 450 001 9910483531203321 005 20210710103242.0 010 $a981-336-730-X 024 7 $a10.1007/978-981-33-6730-2 035 $a(CKB)4100000011763288 035 $a(DE-He213)978-981-33-6730-2 035 $a(MiAaPQ)EBC6480203 035 $a(PPN)25385766X 035 $a(EXLCZ)994100000011763288 100 $a20210710d2021 uy 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecure control of networked control systems and its applications /$fDong Yue, Songlin Hu, Zihao Chen 205 $a1st ed. 2021. 210 1$aGateway East, Singapore :$cSpringer,$d[2021] 210 4$d©2021 215 $a1 online resource (XV, 272 p. 101 illus., 92 illus. in color.) 311 $a981-336-729-6 327 $aIntroduction -- Resilient Event-Triggered Controller Synthesis of Networked Control Systems Under Periodic DoS Jamming Attacks -- Observer-Based Event-Triggered Control for Networked Linear Systems Subject to Denial-of-Service Attacks -- Security Control of Cyber-Physical System Based on Switching Approach for Intermittent Denial-of-Service Jamming Attack -- Event-Based Secure Leader-Following Consensus Control for Multiagent Systems With Multiple Cyber Attacks -- Observer-Based Distributed Secure Consensus Control of a Class of Linear Multi-Agent Systems Subject to Random Attacks -- Security Control of Networked T-S Fuzzy System Under Intermittent DoS Jamming Attack with Event-Based Predictor -- Bandwidth Allocation-Based Switched Dynamic Triggering Control Against DoS Attacks -- Attack-Resilient Event-Triggered Controller Design of DC Microgrids Under DoS Attacks -- Resilient dynamic event-triggered control for multi-area power systems with renewable energy penetration under DoS attacks -- Resilient Load Frequency Control Design: DoS Attacks Against Additional Control Loop -- Secure Distributed Optimal Frequency Regulation of Power Grid with Time-Varying Voltages under Cyberattack. 330 $aThis book shows some secure control methods of networked control systems related to linear control system, nonlinear control system, multi-agent system and its applications in power systems. The proposed secure control methods provide some useful results about modeling of network attacks, resilient analysis and synthesis methods, active defense control method. The contents of this book are lists as followings. (1) Modeling of DoS attacks, deception attacks and replay attacks; (2)Secure control methods are proposed by combing delay system method, switched system method and event-based control method. (3) Active control methods are proposed by using model-predictive control and redundant control. (4) The proposed control methods are applied to the security problem of power system. The methods of this book include DoS attacks modeling such as, periodic jamming attack model,model-based average dwell time model, deception attack modeling and relay attack modeling; piece-wise Lyapunov-Krasoviskii functional method, stochastic control method; the results including resilient conditions of networked control system and related resilient control design method with linear matrix inequalities(LMIs). From this book, readers can learn about the general network attack modeling methods, resilient analysis and synthesis methods, active control methods from viewpoint of redundancy control, and secure conditions of power systems. Some fundamental knowledge prepared to read this book includes delay system theory, event triggered mechanism, T-S fuzzy system theory and frequency/voltage control of power system. 606 $aAutomatic control 615 0$aAutomatic control. 676 $a629.8 700 $aDong$b Yue$f1620-1686,$01226307 702 $aHu$b Songlin 702 $aCheng$b Zihao 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a9910483531203321 996 $aSecure control of networked control systems and its applications$92850782 997 $aUNINA