Nederlands
  nl
English
  en
contact veelgestelde vragen
SMB
 
Attack-and-Defense Games for Control Systems
Hoofdkenmerken
Auteur: Huanhuan Yuan; Yuan Yuan; Huapeng Dong; Yuanqing Xia; Mengbi Wang
Titel: Attack-and-Defense Games for Control Systems
Uitgever: Taylor & Francis
ISBN: 9781040093900
ISBN boekversie: 9781032774640
Editie: 1
Prijs: € 239.80
Verschijningsdatum: 06-08-2024
Inhoudelijke kenmerken
Categorie: Computer Engineering
Taal: English
Imprint: CRC Press
Technische kenmerken
Verschijningsvorm: E-book
 

Inhoudsopgave:

This vital work for researchers and graduate students focuses on resilience estimation and control of cyber-physical networked systems using attacker-defender game theory. It presents attack and defense strategies and describes the design and resilience of control systems to withstand cyberattacks. Complex control systems, including cyber-physical and cloud control systems, are in open network environments and are often confronted with threats from cyberspace, physical space and even cloud service. With diversified and intelligent attack patterns and improvements in attack capabilities, non-contact damage can be widespread. In this book, the authors use a formal, mathematical approach to introduce their recent research findings to describe and design attack and defense strategies using game theoretic method. The book is divided into three sections, focusing on strategies for resilience against deception attacks and DoS attacks, and protecting cloud control systems against threats. In these sections, the authors address topics such as secure and distributed filtering, attack detection and disturbance rejection, resilient state estimation, and resilient control, and techniques such as Stackelberg games, hierarchical games, and active eavesdropping. Through this book readers will be able to design effective defense strategies for complex control system to achieve resilience for closed-control cyber physical systems, network and cloud systems. This book is a vital resource for graduate students and academic researchers who are familiar with the concepts related to cyberattack and defense and who have a related research background. To maximize their benefit from this book, readers are recommended to have a strong mathematical foundation as the book takes a mathematical approach to the concepts and strategies described within.
leveringsvoorwaarden privacy statement copyright disclaimer veelgestelde vragen contact
 
Welkom bij Smartbooks