000 03862nam a22005895i 4500
999 _c200457576
_d75788
003 TR-AnTOB
005 20231123160204.0
007 cr nn 008mamaa
008 211019s2022 sz | s |||| 0|eng d
020 _a9783030883508
024 7 _a10.1007/978-3-030-88350-8
_2doi
040 _aTR-AnTOB
_beng
_cTR-AnTOB
_erda
041 _aeng
050 4 _aQA76.9.A25
072 7 _aTJF
_2bicssc
072 7 _aGPFC
_2bicssc
072 7 _aTEC007000
_2bisacsh
072 7 _aTJF
_2thema
072 7 _aGPFC
_2thema
090 _aQA76.9.A25EBK
100 1 _aWu, Chengwei.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSecurity of Cyber-Physical Systems: State Estimation and Control
_h[electronic resource] /
_cby Chengwei Wu, Weiran Yao, Guanghui Sun, Ligang Wu.
250 _a1st ed. 2022.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2022.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aStudies in Systems, Decision and Control,
_x2198-4190 ;
_v396
505 0 _aIntroduction -- Optimal DoS Attack Scheduling for CPSs -- Active Defense Control of CPSs via Sliding Mode -- Learning Tracking Control for CPSs -- Intelligent Control for Nonlinear Networked Control Systems -- Reliable Filtering of Sensor Networks -- Secure Estimation for CPSs via Sliding Mode -- Zero-Sum Game Based Optimal Secure Control -- Proactive Secure Control for CPSs. Fault-Tolerant Tracking Control for Nonstrict-Feedback Systems -- Deep Reinforcement Learning Control Approach to Mitigating Attacks -- Conclusion and Further Work.
520 _aThis book analyzes the secure problems of cyber-physical systems from both the adversary and defender sides. Targeting the challenging security problems of cyber-physical systems under malicious attacks, this book presents some recent novel secure state estimation and control algorithms, in which moving target defense scheme, zero-sum game-theoretical approach, reinforcement learning, neural networks, and intelligent control are adopted. Readers will find not only the valuable secure state estimation and control schemes combined with the approaches aforementioned, but also some vital conclusions for securing cyber-physical systems, for example, the critical value of allowed attack probability, the maximum number of sensors to be attacked, etc. The book also provides practical applications, example of which are unmanned aerial vehicles, interruptible power system, and robot arm to validate the proposed secure algorithms. Given its scope, it offers a valuable resource for undergraduate and graduate students, academics, scientists, and engineers who are working in this field.
650 0 _aCooperating objects (Computer systems).
650 0 _aControl engineering.
650 0 _aDynamics.
650 0 _aNonlinear theories.
650 1 4 _aCyber-Physical Systems.
650 2 4 _aControl and Systems Theory.
650 2 4 _aApplied Dynamical Systems.
653 0 _aCooperating objects (Computer systems) -- Security measures
700 1 _aYao, Weiran.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aSun, Guanghui.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aWu, Ligang.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
830 0 _aStudies in Systems, Decision and Control,
_x2198-4190 ;
_v396
856 4 0 _uhttps://doi.org/10.1007/978-3-030-88350-8
_3Springer eBooks
_zOnline access link to the resource
942 _2lcc
_cEBK