TIENE EN SU CESTA DE LA COMPRA
en total 0,00 €
Features
Provides an extensive introduction to state-of-the-art cyber security theories and technologies from the viewpoint of close-loop
Identifies the quantitative characteristics of typical cyber attacks and analyzes the attack decision mechanisms in closed-loop industrial systems in depth
Proposes novel intrusion detection mechanisms against cyber attacks in industrial control systems
Presents a systematic understanding of the secure architectural design for industrial control systems
Addresses secure control approaches against cyber attacks for the representative applications in industrial control systems
Summary
Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts.
The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios.
The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.
Table of Contents
SECURE STATE ESTIMATION
A Game-Theoretic Approach to Jamming Attacks on Remote State Estimation in Cyber-Physical Systems
Yuzhe Li, Ling Shi, Peng Cheng, Jiming Chen, and Daniel E. Quevedo
Secure State Estimation against Stealthy Attack
Yilin Mo
Secure State Estimation in Industrial Control Systems
Arash Mohammadi and Konstantinos N. Plataniotis
RESILIENT CONTROL THEORY
Optimal Denial-of-Service Attack Policy against Wireless Industrial Control Systems
Heng Zhang, Peng Cheng, Ling Shi, and Jiming Chen
Behavior Rule Specification-Based False Data Injection Detection Technique for Smart Grid
Beibei Li, Rongxing Lu, and Haiyong Bao
Hierarchical Architectures of Resilient Control Systems: Concepts, Metrics, and Design Principles
Quanyan Zhu, Dong Wei, and Kun Ji
Topology Control in Secure Wireless Sensors Networks
Jun Zhao
Resilient Distributed Control in Cyber-Physical Energy Systems
Wente Zeng and Mo-Yuen Chow
SECURITY ISSUES IN APPLICATION FIELDS
Distributed Resilient Control of Operator-Vehicle Networks under Cyber Attacks
Minghui Zhu and Sonia Martinez
Privacy-Preserving Data Access Control in the Smart Grid
Kan Yang, Xiaohua Jia, and Xuemin (Sherman) Shen