|
Showing 1 - 2 of
2 matches in All Departments
This book analyzes the secure problems of cyber-physical systems
from both the adversary and defender sides. Targeting the
challenging security problems of cyber-physical systems under
malicious attacks, this book presents some recent novel secure
state estimation and control algorithms, in which moving target
defense scheme, zero-sum game-theoretical approach, reinforcement
learning, neural networks, and intelligent control are adopted.
Readers will find not only the valuable secure state estimation and
control schemes combined with the approaches aforementioned, but
also some vital conclusions for securing cyber-physical systems,
for example, the critical value of allowed attack probability, the
maximum number of sensors to be attacked, etc. The book also
provides practical applications, example of which are unmanned
aerial vehicles, interruptible power system, and robot arm to
validate the proposed secure algorithms. Given its scope, it offers
a valuable resource for undergraduate and graduate students,
academics, scientists, and engineers who are working in this field.
This book analyzes the secure problems of cyber-physical systems
from both the adversary and defender sides. Targeting the
challenging security problems of cyber-physical systems under
malicious attacks, this book presents some recent novel secure
state estimation and control algorithms, in which moving target
defense scheme, zero-sum game-theoretical approach, reinforcement
learning, neural networks, and intelligent control are adopted.
Readers will find not only the valuable secure state estimation and
control schemes combined with the approaches aforementioned, but
also some vital conclusions for securing cyber-physical systems,
for example, the critical value of allowed attack probability, the
maximum number of sensors to be attacked, etc. The book also
provides practical applications, example of which are unmanned
aerial vehicles, interruptible power system, and robot arm to
validate the proposed secure algorithms. Given its scope, it offers
a valuable resource for undergraduate and graduate students,
academics, scientists, and engineers who are working in this field.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|