LEADER 03490nam 22006135 450 001 9910983054503321 005 20250630101914.0 010 $a9789819793969 010 $a9819793963 024 7 $a10.1007/978-981-97-9396-9 035 $a(CKB)37156135400041 035 $a(MiAaPQ)EBC31875789 035 $a(Au-PeEL)EBL31875789 035 $a(DE-He213)978-981-97-9396-9 035 $a(OCoLC)1498703961 035 $a(EXLCZ)9937156135400041 100 $a20250104d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aSecure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks /$fby Bo Chen, Tongxiang Li, Wen-An Zhang, Li Yu 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (269 pages) 311 08$a9789819793952 311 08$a9819793955 327 $aIntroduction -- Secure dimensionality reduction fusion estimation against eavesdroppers in cpss -- Distributed privacy preserving fusion estimation using homomorphic encryption -- fdi attack detection using fusion estimation methods -- Secure infinity fusion estimation against dual channel fdi attacks based on intermediate variable.-Distributed fusion estimation for nonlinear cpss under attacked control signals -- Networked nonlinear fusion estimation under dos attacks -- Active secure control against dos attacks using predictive control approach -- Security control against time delay attacks using switched system approach -- Adaptive output regulation for cpss under time delay attacks -- Attack resilient control against fdi attacks using sliding mode control. 330 $aThe book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks. The comprehensive and systematic treatment of security protection in cyber-physical systems is one of the main features of the book, which is particularly suitable for readers interested in learning practical solutions for the security of cyber-physical systems. The book can benefit researchers, engineers and graduate students in the fields of control science and engineering, computer science, communication engineering, etc. 606 $aTelecommunication 606 $aCooperating objects (Computer systems) 606 $aComputer networks$xSecurity measures 606 $aCommunications Engineering, Networks 606 $aCyber-Physical Systems 606 $aMobile and Network Security 615 0$aTelecommunication. 615 0$aCooperating objects (Computer systems) 615 0$aComputer networks$xSecurity measures. 615 14$aCommunications Engineering, Networks. 615 24$aCyber-Physical Systems. 615 24$aMobile and Network Security. 676 $a621.382 700 $aChen$b Bo$0689228 701 $aLi$b Tongxiang$01784482 701 $aZhang$b Wen-An$01060319 701 $aYu$b Li$01784483 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910983054503321 996 $aSecure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks$94316082 997 $aUNINA