, , , e.a.

Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks

Gebonden Engels 2025 9789819793952
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The book focuses on the issues of secure fusion estimation and control in cyber-physical systems under cyber-attacks, such as privacy protection under eavesdropping attacks, security fusion estimation under DoS and FDI attacks, and model-based and model-free security control under cyber-attacks. The comprehensive and systematic treatment of security protection in cyber-physical systems is one of the main features of the book, which is particularly suitable for readers interested in learning practical solutions for the security of cyber-physical systems. The book can benefit researchers, engineers and graduate students in the fields of control science and engineering, computer science, communication engineering, etc.

Specificaties

ISBN13:9789819793952
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:200
Uitgever:Springer Nature Singapore

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Introduction.-&nbsp;Secure dimensionality reduction fusion estimation against eavesdroppers in cpss.-&nbsp;Distributed privacy preserving fusion estimation using homomorphic encryption.- fdi attack detection using fusion estimation methods.-&nbsp;Secure infinity fusion estimation against dual channel fdi attacks based on intermediate variable.-Distributed fusion estimation for nonlinear cpss under attacked control signals.-&nbsp;Networked nonlinear fusion estimation under dos attacks.- Active secure control against dos attacks using predictive control approach.-&nbsp;Security control against time delay attacks using switched system approach.- Adaptive output regulation for cpss under time delay attacks.-&nbsp;Attack resilient control against fdi attacks using sliding mode control.</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Secure Fusion Estimation and Control for Cyber-Physical Systems Under Malicious Attacks